Quick Heal Endpoint Security 6.0

Administrator’s Guide

QHEPS Total QHEPS Business

Quick Heal Technologies (P) Ltd. http://www.quickheal.com

Copyright Information

Copyright © 2013 Quick Heal Technologies (P) Ltd. All Rights Reserved. All rights are reserved by Quick Heal Technologies (P) Ltd. No part of this software may be reproduced, duplicated or modified in any form or incorporated into any information retrieval system, electronic or any other or transmitted in any form without prior permission of Quick Heal Technologies (P) Ltd, 603 Mayfair Towers II, Wakdewadi, Shivajinagar, Pune-411 005, . Marketing, distribution or use by anyone barring the people authorized by Quick Heal Technologies (P) Ltd. is liable to legal prosecution. Trademarks Quick Heal and DNAScan are registered trademarks of Quick Heal Technologies (P) Ltd.

i

End-User License Agreement

QUICK HEAL Endpoint Security End-User License Agreement

PLEASE READ THIS QUICK HEAL ENDPOINT SECURITY END-USER LICENSE AGREEMENT (HEREINAFTER REFERRED TO AS THE “AGREEMENT”) CAREFULLY BEFORE USING OR TRYING TO ATTEMPT TO USE THIS QUICK HEAL SOFTWARE.

BY USING THIS SOFTWARE OR BY CLICKING THE "I AGREE" BUTTON OR ATTEMPTING TO/CONSENTING TO INSTALL THE SOFTWARE IN ANY WAY, (SUCH ACTION WILLL CONSTITUTE A SYMBOL OF YOUR SIGNATURE), YOU ACKNOWLEDGE AND ADMIT THAT YOU HAVE READ, UNDERSTOOD AND AGREED TO ALL THE TERMS AND CONDITIONS OF THIS AGREEMENT. THIS AGREEMENT ONCE ACCEPTED BY “YOU”[ AS AN INDIVIDUAL (ASSUMING YOU ARE ABOVE 18 YEARS AND/OR HAVING LEGAL CAPACITY TO ENTER INTO AN AGREEMENT ), OR THE COMPANY OR ANY LEGAL ENTITY THAT WILL BE USING THE SOFTWARE (HEREINAFTER REFERRED TO AS 'YOU' OR 'YOUR' FOR THE SAKE OF BREVITY)] SHALL BE A LEGALLY ENFORCEABLE AGREEMENT BETWEEN YOU AND QUICK HEAL TECHNOLOGIES PRIVATE LIMITED, PUNE, INDIA (HEREINAFTER REFERRED TO AS “QUICK HEAL”) AND YOU SHALL HAVE THE RIGHTS TO USE THE SOFTWARE SUBJECT TO THE TERMS AND CONDITIONS MENTIONED IN THIS AGREEMENT OR AS AMENDED BY QUICK HEAL FROM TIME TO TIME. IF YOU DO NOT AGREE TO ALL THE TERMS AND CONDITIONS BELOW, DO NOT USE SOFTWARE IN ANY WAY AND PROMPTLY RETURN THE SAME (WITHOUT USING THE SAME) IN YOUR POSSESSION.

In consideration of payment of the License Fee, evidenced by the Receipt, Quick Heal grants You, a non- exclusive and non-transferable right to use of the Software during the License Period (as stated in your invoice) an Endpoint Security solution, according to the technical requirements described in the User Manual and which is subject to the terms and conditions of this Agreement.

Quick Heal reserves all rights not expressly granted, and retains title and ownership of the Software. This Software and the accompanying written materials are the property of Quick Heal and are copyrighted.

1. DEFINITIONS

a. “Device” means the personal digital assistants, smartphones, handheld devices, or other electronic devices for which the Software is specifically designed (for such system requirements as particularly described in the User manual or www.quickheal.com) where the Software will be installed and/or used. b. “Distributors” means the authorized distributors, agents, sub-distributors of Quick Heal, selling Quick Heal range of products, including sales through Internet. c. “License period” means the period commencing from the date of installation of Software (Effective date) upto the period mentioned in the Invoice. d. “Normal working hours” shall mean 09:30 a.m. to 6:30 p.m. Indian Standard timing (IST) on Working Days and "Working Days" means Mondays to Fridays inclusive, but excluding bank and public holidays in the India.

ii

End-User License Agreement

e. “Support” means the Technical Assistance in order to use the Software, provided by Quick Heal, which may or may not be chargeable to you. Please refer www.quickheal.com for more details. f. “Updates” means collections of any or all among virus definition files including detections and solutions for new viruses along with the corrections, improvements or modifications to the Software. g. “Upgrades” means any correction, improvement, modification or yearly enhancements in the form of the new version of the Software which Quick Heal generally releases once in a year. h. “User Manual” means the user guide, Help Guide, documentation provided with the Software, updated agreements provided on the website of Quick Heal (www.quickheal.com), explanatory or other materials as provided from time to time by Quick Heal. i. “You” means the “End User” means an Individual/organization who has purchased Software for his/her own use and not for resale or further distribution: (i) An individual (such an individual) using/legally acquiring the Software on his/her own behalf and every other person (whether authorized or not by such an individual) who uses/has the possession of the Software; or (ii) An organization (including but not limited to a partnership, joint venture, Limited Liability partnership, Limited Liability Company, Company of any nature, Trust, Governmental Authority, Unincorporated Organization, Association of Persons) or any person (such person) who have been authorized by such an Organization to use the Software, accept the Agreement on behalf of the Organization and every other person (whether authorized or not by such person) who uses/has the possession of the Software.

2. RESTRICTIONS

You are liable for risk of loss or damage of the Software while it is in your possession or control. You (including your employees, agents, contractors not authorized by Quick Heal) agree not to: a. emulate, or adapt any portion of the software. b. debug, decompile, modify, translate and reverse engineer the software. c. try making an attempt to reveal/discover the source code of the software. d. create derivative works based on the software or any portion thereof with sole exception of a non- waivalbe right granted to You by any applicable legislation. e. remove or alter any copyright notices or proprietary notices on any labels, or marks of the Software. f. reduce any part of the software to human readable form. g. Demonstrate, copy, sell the software to any third party. h. publish or otherwise disclose information relating to the performance or quality of the software to any third party. i. sublicense, rent or lease any/all portion of the software. j. use for unlicensed and illegal purpose. k. assign or transfer any of your rights or obligations under this Agreement.

3. ACTIVATION / INSTALLATION

a. Quick Heal will install Software onsite / remote support. You need to follow the steps mentioned in Quick Start Guide of Software. Quick Heal expressly disclaims any loss of data, loss of profits during such installation. If you modify your Device or make alterations/modifications to other vendors’ software installed on it, you may be required to repeat activation of the software or

iii End-User License Agreement

installation of license key file or in case contact Quick Heal Support. Quick Heal reserves the right to verify the validity/legality of license and software. b. Quick Heal will verify the Device submitted by the user at the time of registration, if there are problems in verification, product will not be activated / installed. This is an essence term for activation of product. c. The license rights granted under this Agreement are limited for the first twenty (20) days after you first install the Product unless you supply registration information required to activate your licensed copy as described in Activation Wizard of the Product. You can activate the Product through the Internet. You may also need to reactivate the Product if you happen to re-install the product due to some reasons. There are technological measures in this Product that is designed to prevent unlicensed or illegal use of the Product. d. You agree that we may use those measures. You agree that Quick Heal's software may use the measures that can control and prevent piracy of softwares. e. As the only warranty under this Agreement, and in the absence of accident, abuse or misapplication, Quick Heal warrants, to the original Licensee only, that the disk(s) on which the software is recorded is free from defects in the materials and workmanship under normal use and service for a period of thirty (30) days from the date of payment as evidenced by a copy of the Receipt. Quick Heal's only obligation under this Agreement is, at Quick Heal's option, to either (a) return payment as evidenced by a copy of the Receipt or (b) replace the disk that does not meet Quick Heal's limited warranty and which is returned to Quick Heal with the copy of the Receipt.

4. THIRD PARTY WEBSITE LINKS

At some point the software product includes links to third party sites; you may link to such third party websites as the user of this software. The third party sites are not under the control of Quick Heal and Quick Heal is not responsible for the contents of any third party website, any links contained in the third party’s websites. Quick Heal is providing these links to third party websites to you only as a convenience and is not responsible for any kind of loss/ damage arising out of it.

5. TERM

You are entitled to use Software only during the license period commencing from the date of activation of the Software upto the period mentioned in your invoice details. Except for evaluation and beta licenses or other licenses where the term of the license is limited per the evaluation/beta or other agreement, the term of the license is for the duration mentioned in your Invoice.

6. FEATURES OF SOFTWARE

a. During the License Period of the Software, You have the right to use features of software. b. During the License Period of the Software, You have the right to receive free Updates of the Software as and when Quick Heal publishes the Updated Virus-database and free version upgrade as and when Quick Heal releases new version upgrade. You agree, understand and accept that You will be required to regularly download Updates published by Quick Heal. Any and all Updates/upgrades you receive from Quick Heal shall be governed by this Agreement, or as amended from time to time by Quick Heal. c. You agree, accept and acknowledge:

iv End-User License Agreement

(i) that You are solely responsible for the configuration of the Software Settings and the results, actions, inactions initiated due to the same and Quick Heal assumes no liability/responsibility in any case and the Clause of Indemnification shall be applicable. (ii) that Quick Heal assumes no liability/responsibility for any data deletion, including but not limited to any deletion/loss of personal, and/or confidential data; and/or uninstallation of third party apps; and/or change in settings; and / or change in contacts and / or Deletion/loss of contacts, specifically authorized by You or occurs due to the actions, inactions (whether intentional or not) by You or any third party whom You have authorized to use, handle your Device due to features of Software. (iii) that to avail/use certain features of the Software, you may be required to incur some cost and that Quick Heal does not warrant that the usage of certain features of the Software are free of cost and that Quick Heal shall not entertain and expressly disclaims, any claim for reimbursement of any expenses including but not limited to any direct or incidental expenses arising out of Your usage of such features of the Software. (iv) that you be solely responsible and shall comply all applicable laws, regulations of India and any foreign laws including without limitation, privacy, obscenity, confidentiality, copyright laws for using any report, data, information derived as a result of using the Software. (v) that while using the Software, Quick Heal suggests some actions to be initiated by You in your sole benefit, for example “Quick Heal software may suggest You to uninstall infected applications”, however such actions are suggestive and Quick Heal takes no responsibility/liability if you perform such suggestive actions or not and Quick Heal assumes no responsibility/liability for any liability arising out of such actions/inactions.

7. SUPPORT

Quick Heal offers support features during usage of this software i.e., Live Chat with technical support team and/ or the technical support team may, at your discretion, take remote access. The availing of this support will be solely at your discretion and you are solely responsible to take back up of the existing data/software/programs in your Device before availing such a support. Quick Heal will not be held responsible for any loss of data, any kind of direct/ indirect/ consequential loss or damage to data/ property arising during this entire process. If at any point of time the Technical Support team is of the opinion that it is beyond their scope, it will be the sole discretion of Quick Heal to suspend, cease, terminate or refuse such support as Quick Heal does not claim any warranty and/or guarantee of any kind in providing the support feature.

8. EMAIL/ELECTRONIC COMMUNICATION

Once you register the software by activating / installing the software, Quick Heal may communicate with you on the contact information submitted during the registration process through email or any other electronic communication device. The communication can be for the purpose of product verification for your convenience.

9. QUICK HEAL STATUS UPDATE

Upon every update of licensed copy, Quick Heal Update module will send current product status information to Quick Heal Internet Center. The information that will be sent to the Internet Center includes the Quick Heal protection health status like, which monitoring service is in what state in the system. The information will be used to provide quick and better technical support for legitimate customers.

v End-User License Agreement

All the registered users/subscribers will get the updates free of cost from the date of license activation till the expiry date of the license.

10. COLLECTION OF INFORMATION

Quick Heal software may collect the following information which may / may not contain any personally identifiable information either with or without your discretion/permission for statistical purpose or enhancing and evaluating the ability, effectiveness and performance of Quick Heal's product in identifying and/or detecting the malicious behavioral pattern, inherently fraudulent websites and other Internet security threats/ risks. Password entered by the end users during registration is not stored at Quick Heal server. This information will not be correlated with any personally identifiable information except as herein stated and shall include, but not limited to: a. Any type of Executable files which the Software may identify having a potentially malware behavioral pattern. b. Any type of information relating to the status of the software that whether there occurred any error while installing the Software or the installation was successful. c. Any type of URLs of websites visited that the Software deems inherently and potentially fraudulent. d. Any type of information that Software deems potentially fraudulent, posing security risks/ threats. e. Any type of information for identifying the Media Access Control (MAC) address of the Device, Global Positioning System (GPS) on which the Software has been installed. f. Any type of information for identifying the Internet Protocol (IP) Address and information required for effective license administration and enhancing product functionality and usability. g. You admit that the information/data as collected above can be used for analyzing, preventing and detecting the potential internet security risks, publishing any type of data/ reports/ presentations on the trends collected, sharing the data to create awareness with any organizations, vendors.

11. INTELLECTUAL PROPERTY RIGHTS

You understand and acknowledge that Quick Heal Software including all subsequent copies in any media is the sole proprietary of Quick Heal and Quick Heal does not grant any right, title and interest in Quick Heal Software or in any Intellectual Property of Quick Heal or third party licensor. Any error corrections, modification, enhancements, updates, upgrades made to Software by you or Quick Heal will be the sole and exclusive property of Quick Heal. Software and the accompanying written materials are the property of Quick Heal and are copyrighted. Copying of the Software or the written material is expressly forbidden. The Software, software, source code, activation code, license keys, documentation, systems, ideas, information, content, design and other matters related to the software, trademarks, are the sole proprietary and Intellectual Property rights of Quick Heal protected under the Intellectual property Laws and belong to Quick Heal. Title in the Software shall remain with Quick Heal unless and until full payment is received from you. No license, right or interest in Quick Heal’s logos, trademarks is granted to You under this Agreement and you hereby agree not to remove any product identification or notices of proprietary restrictions.

12. YOUR RESPONSIBILITIES

You understand, agree, warrant and are responsible: a. to adhere and follow the User Manual provided alongwith the Software. Quick Heal has mentioned the user guidelines in the user manual. Any violation found in terms of usage not prescribed in the User manual, will result in void warranty with immediate effect.

vi End-User License Agreement

b. For any attempt found to open the Software. The Software comes duly sealed and in a tested condition, hence any attempt found to open the Software or if the security shield found to be broken will result in cancellation of hardware warranty. c. to immediately notify Quick Heal about the problems, if any arising in the Software and to request for the support services to the authorized agents, employees of Quick Heal in such format as notified by Quick Heal from time to time. d. to carry out all the recommendations of Quick Heal for determining the nature or cause of a problem and for the resolution of the same. You shall be solely responsible for maintenance and support of all the designated hardware, servers, networking products, other equipments and operating systems, database software on or which you operate the Software. e. for any loss of or damage to the Software including but not limited to mishandling, misuse, neglect, improper testing, unauthorized repair, or alteration of the Software or processing that alters physical or electrical properties of any Software and/or related components.

13. LIMITED WARRANTY AND DISCLAIMERS

a. The Software provided by Quick Heal is “AS IS” and “AS AVAILABLE” without warranty of any kind, expressed or implied, including but not limited to the implied warranties of merchantability, fitness, usage, performance, satisfactory quality, integration, applicability for a particular use and any other warranties are disclaimed to the fullest extent permissible pursuant to the applicable law. b. Quick Heal does not warrant, make any representations that Software will work uninterrupted, timely, secure or error-free or shall meet any or all your requirements whether disclosed to Quick Heal or any of its directors, agents, distributors and employees. The entire risks, faults as to performance of the Software, to achieve your intended results, the results obtained from the Software shall be assumed by You. c. You understand and accept that the Software will substantially perform according to the specifications, descriptions stated in the User Manual, as updated from time to time, subject to the following and Quick Heal expressly disclaims any and all liabilities arising from the following circumstances: (i) incompatibility caused by any software and/or hardware components installed on your Network/server where the Software will be/is installed. (ii) Any actions initiated by You or by third parties which were beyond the reasonable control of Quick Heal. (iii) Any failures, malfunctions, defects resulting from abuse, improper installation, theft, misuse, accident, operation or maintenance, acts of God, alteration, power failures, casualty, alterations, neglect, non-permitted modifications, acts of terrorism, vandalism and unauthorized repairs. (iv) If the Software has been mishandled at your premises either purposefully and/or due to in- appropriate working conditions or due to your negligence and/or attempts have been made to re-install, repair modify etc. without the supervision of the Quick Heal. The Software should be used in the operating environment as mentioned in user guide, if found to be used in other non supportive environment the warranty will be void. (v) the deficiencies, defects, in Your premises for operation and related infringements. (vi) Your violations of the terms and conditions described in the User manual or in this Agreement.

vii End-User License Agreement

14. INDEMNIFICATION

a. You expressly understand, admit and warrant that in no event shall Quick Heal and/or any of its directors, employees, agents, partners, distributors be liable from any and against all claims, expenses, suits, costs, demands, judgments whatsoever made by you and/ or any third party for any direct, indirect, incidental, special, punitive, consequential and/or exemplary damages including, but not limited to damages for loss of business / profits, damages for loss of confidential / other information, failure to meet any statutory duty / duty of reasonable care / duty in good faith, economic / notional loss, loss for business interruption, goodwill, damage and loss of data or programs, or other intangible losses (even if Quick Heal has been advised of the possibility of such damages), to the fullest extent permissible by law: (i) Arising due to your usage of Software. (ii) your negligence or inability of using the Software or support. (iii) any dispute between you and third party with respect to availing the Software. (iv) your violation of any rights of any other individual and/or entity. (v) your breach of the Agreement. (vi) the failure of Quick Heal to provide Support Service or any other. (vii) In case of Hardware problem standard RMA procedure will be followed which may differ region specific. (viii) service/information. b. This limitation will apply to all causes of action whether arise in equity or tort, including but not limited to breach of contract, breach of warranty, negligence, strict liability, misrepresentations and You hereby release Quick Heal and/or its directors, employees, agents, distributors from any and all obligations, liabilities in excess of the limitation stated herein. c. Notwithstanding any other terms of this Agreement, the maximum liability of Quick Heal for any claims under this Agreement shall in no event exceed the amounts payable by You towards the purchase of Quick Heal Software. Claim would vary depending upon the assessment done by Quick Heal and would be subject to above.

15. GENERAL

a. Force Majeure. Quick Heal shall not be liable for any damages or penalty for delay of failure in performance of its obligations, pursuant to any accepted purchase order, or for failure to give notice of delay when such delay is caused by the elements, acts of God, delay in transportation, delay in delivery or performances by Quick Heal’s vendors or other third parties, shortages of materials, or labor interruptions, or any other causes beyond the reasonable control of Quick Heal. Provided that Quick Heal shall Endeavour to complete the task within a reasonable period after happening of any event as covered under such force majeure. b. Legal Jurisdiction. This agreement and any matter relating thereto shall be subject only to jurisdiction of Courts at Pune, India and shall be interpreted as per the terms of the law/s for the time being in force in India. Any dispute which may arise out of this Agreement, breach of terms and conditions under this Agreement, shall be settled by direct negotiations between You and Quick Heal. In the case of failure to resolve the dispute in the manner set out above within 30 days from the date when the dispute arose, the dispute shall be referred to a panel of three arbitrators, with Quick Heal appointing one arbitrator, You appointing one arbitrator and the arbitrators so appointed jointly nominating a third presiding arbitrator. The venue of arbitration shall be Pune. The arbitration proceedings shall be governed by the Arbitration and Conciliation Act, 1996 and Indian Laws and shall be conducted in the English language. The arbitrators shall

viii End-User License Agreement

also decide on the costs of the arbitration proceedings. To the extent possible, after the commencement of any arbitral proceedings the Parties shall continue to perform their respective obligations under this Agreement. The provisions of this Clause shall survive termination of this Agreement. Subject to the provisions of this Clause, the Courts in Pune, India shall have exclusive jurisdiction and the parties may pursue any remedy available to them at law or equity. Notwithstanding this dispute resolution procedure, either party shall have the right to seek an injunction in a court of appropriate jurisdiction, in the event that it believes that its intellectual property rights are at risk. c. Complete Agreement. This Agreement comprises the entire agreement between the parties regarding it subject matter, and supersedes any proposals, negotiations, representations, advertisements, marketing materials or communications whether, oral or written, with respect to the Software or to subject matter of this Agreement. You shall be bound by any and all clauses of the Agreement updated and displayed by Quick Heal on the website www.quickheal.com from time to time. Any waiver by either party of any violation of any provision of this agreement by the other party will not be deemed to waive any other violation of the same or any other provision. d. Severability. If any of the provisions contained in this Agreement is found by a court of competent jurisdiction to be invalid, illegal or unenforceable in any respect, the validity, legality or enforceability of the remaining provisions contained herein shall not be in any way affected or impaired thereby and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. e. Survival. The Clauses in this Agreement including not limited to rights to License fees receivable, “Indemnification”, “Limited Warranties & Disclaimers” and “Intellectual Property” shall survive expiration or termination of this Agreement. f. You cannot assign your rights or delegate duties or obligations under this Agreement. The failure to exercise or delay in exercising a right or remedy by Quick Heal under this Agreement shall not constitute a waiver of the right or remedy or a waiver of any prior, concurrent or subsequent right or remedy. g. The Section numbers and headings are included merely for the convenience of the parties and are not to be construed in interpreting this Agreement. h. Quick Heal reserves right to amend this End-User License Agreement from time to time and will keep updated on its website www.quickheal.com and it would be binding on end user. This is an essence of use of software. i. Quick Heal reserves the right to co-operate with any legal process and may provide documents, information related to your use of the Software.

ix

About This Document

This Administrator’s Guide covers all the information about how to install and how to use Quick Heal Endpoint Security in the easiest possible ways. We have ensured that all the details provided in this guide are updated with the latest enhancements of the product. The following list describes the conventions that we have followed to prepare this document.

Convention Meaning

Bold Font Anything highlighted in bold indicates that it is a menu title, window title, check box, drop-down box, dialog, button names, hyperlinks, and so on. This symbol indicates additional information or important information about the topic being discussed. The instruction mentioned in the numbered list indicates actions that you need to perform.

x

Contents

Chapter 1. Introducing Quick Heal Endpoint Security ...... 1 How Does Quick Heal Endpoint Security Work? ...... 1 New in this release ...... 1 Available flavors ...... 2 Network Deployment Scenarios ...... 3 Scenario 1 ...... 4 Network Setup Description ...... 4 Quick Heal Recommendation ...... 4 Scenario 2 ...... 4 Network Setup Description ...... 5 Quick Heal Recommendation ...... 5 Scenario 3 ...... 5 Network Setup Description ...... 6 Quick Heal Recommendation ...... 6 Chapter 2. Getting Started ...... 7 Prerequisites ...... 7 System Requirements ...... 7 Minimum System Requirement for Console System ...... 8 Additional Software Required for Console System ...... 8 If Apache is to be configured as Web server, the version requirement is as follows: ...... 8 Other Essential Configuration on Console System ...... 8 Endpoint side requirements ...... 9 Minimum System Requirements for Windows Endpoint ...... 9 Supported Mac Endpoints ...... 9 Minimum System Requirements for Mac Endpoint ...... 9 Supported Linux Endpoints ...... 10 Installing Quick Heal Endpoint Security on Windows Operating System ...... 10 Installing Multiple Quick Heal Endpoint Security Server ...... 13 Upgrading previous version of Quick Heal Endpoint Security to the latest version ...... 13 Chapter 3. Post Installation Tasks ...... 16 Registration ...... 16 Registering Online ...... 16 Internet Settings ...... 16 Reactivation ...... 17 Reactivating Quick Heal Endpoint Security ...... 17 Configuring Update Manager ...... 17 How to Open Update Manager ...... 17 Status ...... 18 Configuration ...... 18

xi

Contents

Connection Settings ...... 19 Reports ...... 20 Uninstalling Quick Heal Endpoint Security ...... 20 Chapter 4. About Quick Heal Endpoint Security Dashboard ...... 22 Areas on the web console ...... 22 Dashboard Area ...... 24 Overview ...... 24 Network Health ...... 25 Status ...... 25 Security ...... 26 Compliance ...... 26 Assets ...... 26 Chapter 5. Clients ...... 28 Client Status tab ...... 28 Client Action tab ...... 29 Scan ...... 29 Scan Settings ...... 30 Update ...... 31 Tuneup ...... 32 Tuneup Settings ...... 33 Application Control Scan ...... 33 Scan Settings ...... 34 Vulnerability Scan ...... 35 Chapter 6. Client Deployment ...... 36 Through Active Directory ...... 36 Synchronizing with Active Directory ...... 37 Editing Synchronization ...... 37 Removing Synchronization ...... 38 Exclusion ...... 38 Remote Install ...... 39 Exception Rules: ...... 39 Notify Install ...... 41 Client Packager ...... 41 To create a Windows Quick Heal Client package, follow these steps: ...... 42 To create a Mac Quick Heal Client package, follow these steps: ...... 42 Sending the package through email ...... 43 Login Script ...... 43 Installing Login Script ...... 43 Opening Login Script Setup ...... 43 Assigning Login Script ...... 43 Installing Quick Heal Endpoint Security on Mac Operating Endpoints ...... 44

xii Contents

Installing Quick Heal Endpoint Security Client on Linux-based Endpoints ...... 45 Disk Imaging ...... 46 Firewall Exception Rules ...... 46 Remote Uninstall ...... 47 Stop Uninstallation Notifications ...... 47 Chapter 7. Manage Groups ...... 49 Adding a Group ...... 49 Adding a Subgroup ...... 49 Deleting a Group ...... 50 Renaming a Group ...... 50 Importing from Active Directory ...... 51 Setting Policy to a Group ...... 51 Changing Group of an Endpoint ...... 52 Exporting groups and policies ...... 52 Importing groups and policies ...... 52 Chapter 8. Manage Policies ...... 54 Understanding Security Policy Scenario ...... 54 Creating Polices ...... 56 Creating a new policy ...... 56 Renaming a policy ...... 56 Deleting a policy ...... 56 Importing and Exporting Policies ...... 57 Exporting a policy ...... 57 Importing a policy ...... 57 Chapter 9. Assets ...... 58 Viewing the details for Endpoints ...... 58 Enabling Asset Management ...... 58 Chapter 10. Settings ...... 59 Client Settings ...... 59 Scan Settings ...... 59 Scanner Settings ...... 60 Virus Protection Settings ...... 61 Advanced DNAScan Settings ...... 61 Block suspicious packed files ...... 62 Automatic Rogueware Scan Settings ...... 62 Disconnect Infected Endpoints from the network ...... 62 Exclude Files and Folders ...... 63 Exclude Extensions ...... 64 Email Settings ...... 64 Email Protection ...... 64 Trusted Email Clients Protection ...... 65

xiii Contents

Spam Protection ...... 65 External Drives Settings ...... 67 External Drives Settings ...... 67 Autorun Protection Settings ...... 68 Mobile Scan Settings ...... 68 IDS/IPS ...... 68 Firewall ...... 70 Web Security ...... 71 Browsing Protection Settings ...... 72 Phishing Protection Settings ...... 73 Web Categories ...... 73 Application Control ...... 75 Advanced Device Control ...... 77 To create a policy for Advanced Device Control, follow these steps: ...... 77 Adding exceptions to the device control list ...... 79 Adding Device to Server ...... 80 Data Loss Prevention ...... 80 Monitoring /preventing leakage of data ...... 81 File Activity Monitor ...... 82 Enabling File Activity Monitor ...... 82 Update Settings ...... 83 Internet Settings ...... 84 General Settings ...... 85 Schedule Settings ...... 86 Client Scan ...... 86 Client Schedule Scan...... 87 Scanner Settings ...... 87 Antimalware Scan Settings ...... 88 Application Control ...... 88 Application Control Schedule Scan ...... 88 Scan and Report ...... 88 Tuneup ...... 89 Tuneup Schedule Scan...... 89 Tuneup Settings ...... 89 Vulnerability Scan ...... 89 Scheduling Vulnerability Scan ...... 90 Scan and Report ...... 90 Chapter 11. Reports ...... 91 Client ...... 91 Viewing Reports of Virus Scan ...... 91 Viewing Reports of AntiMalware Scan ...... 92 Viewing Reports of Web Security ...... 93 Viewing Reports of Tuneup ...... 93 Viewing Reports of Advanced Device Control ...... 94

xiv Contents

Viewing Reports for Data Loss Prevention (DLP) ...... 95 Viewing reports for DLP ...... 95 Viewing Reports for Application Control ...... 95 Viewing Reports of IDS/IPS ...... 97 Viewing Reports of Firewall ...... 99 Viewing Reports of Vulnerability Scan ...... 99 Reports for File Activity Monitor ...... 100 Viewing reports for file activity ...... 101 Reports for Asset Management ...... 101 Viewing reports for asset management...... 101 Server...... 102 Manage ...... 102 Managing Settings ...... 102 Managing Export ...... 103 Managing Delete Reports ...... 103 Chapter 12. Admin Settings ...... 104 Server...... 104 Password ...... 104 Notification ...... 104 Email & SMS Notification ...... 105 Buy Now ...... 107 SMTP Settings ...... 107 Manage Devices ...... 108 Adding exceptions to the device control policy ...... 108 Redirection ...... 109 Manage Users ...... 110 Super Administrator ...... 110 Administrator ...... 110 Report Viewer ...... 110 Creating New Users ...... 111 Modifying Existing Users ...... 111 Deleting Users ...... 111 General ...... 112 Clients ...... 112 Client Installation ...... 112 Inactive Client Settings ...... 113 Asset Management ...... 113 Chapter 13. Update Manager ...... 114 Viewing Update Manager Status ...... 114 Update Manager Settings ...... 115 Alternate Update Managers ...... 115 Chapter 14. License Manager ...... 116

xv Contents

Status ...... 116 Update License Information ...... 116 View license history ...... 117 License Order Form ...... 117 Renew my license ...... 118 Add license for new endpoints ...... 118 Buy additional feature ...... 119 Chapter 15. Technical Support ...... 120 Support...... 120 Accessing support options ...... 120 Web Support ...... 120 Email Support ...... 120 Live Chat Support ...... 120 Phone Support ...... 120 Support Tips ...... 121 When is the best time to call? ...... 121 Which number to call? ...... 121 For support in other countries: ...... 121 The details that are necessary during the call are: ...... 121 What should I say to the technical support personnel? ...... 121 Global Support Center ...... 122 Online Support ...... 122 Contact Quick Heal Technologies ...... 122

xvi

Chapter 1. Introducing Quick Heal Endpoint Security

For every organization, security of valuable data and resources is of paramount concern. Today Web technology is an integral part of business processes for all organizations. This puts them more at risk from new and unknown threats and attacks. Quick Heal Endpoint Security (QHEPS) is designed to provide complete security solutions to small and enterprise-level networks against various kinds of malicious threats such as viruses, Trojans, worms, backdoors, spyware, riskware, adult content, and hackers. QHEPS is a Web-based management solution that integrates desktops, laptops and network servers. It allows you to access all clients and servers in the network and manage them remotely. You can deploy applications, configure security policies, signature pattern updates and software updates on the clients and servers. You can also monitor clients to check whether there are any policy breaches or security threats within the organization, and take appropriate actions for ensuring security across the networks.

How Does Quick Heal Endpoint Security Work?

Quick Heal Endpoint Security (QHEPS) works on the Client/Server architecture where the console manages all the client agents deployed on the network. The console and client agents can be installed on almost all flavors of Windows operating systems. The client agents can also be installed on the machines with Linux and Mac operating systems (OS). For a detailed description of console and client agent system requirements and compatibilities, see System Requirements. QHEPS helps the administrators deploy Quick Heal AntiVirus remotely on the specified computers, groups or domains, which are the part of the same domain. Whenever the server copy of Quick Heal AntiVirus is updated, all computers configured to update from the server will be automatically updated without user intervention. QHEPS monitors these processes so that an administrator can view the computers that have Quick Heal AntiVirus installed, the virus database date of Quick Heal, whether Virus Protection is enabled, and if viruses are active in the memory of workstations. If any virus is found active in the memory of a workstation, that workstation gets disconnected from the network. If it detects that Quick Heal is uninstalled from any workstation(s), it reinstalls Quick Heal remotely without user intervention. This keeps the computers and the network safe from virus threats.

New in this release

Quick Heal Endpoint Security brings you the following new features:  With Device Control, you can control various types of devices such as Storage devices (USB storage devices,Internal CD/DVD, Internal card reader, Internal floppy drive, ZIP Drive), Card reader devices (MTD, SCSI), Wireless devices (Wi-Fi, Bluetooth), Mobiles

1 Introducing Quick Heal Endpoint Security

(iPhone, Smartphone, Blackberry, iPad,iPod), Camera (Webcam, Digital camera), Local printers, Network share, Windows portable devices. See Advanced Device Control for more information.  Added support for file activity monitor, a feature that lets you know if any suspicious action has taken place with respect to confidential files such as copy, delete, or rename a file. See File Activity Monitor for more information.  Data Loss Prevention (DLP) helps to monitor & block potential sensitive data going out of the organization through the channels like Removable devices, Network share, Clipboard, Print screen, Applications and Online services (such as Web browsers, Email clients, etc.)You can also monitor the following type of data: . Different files (for example, Office files, Image files, etc.) . Confidential information (Credit Card Numbers, IBAN Numbers etc.) . User defined data See Data Loss Prevention for more information.  Added support for Asset Management and reporting whereby you can see how many systems that have EPS agent installed on them Platform-wise and updates to software or hardware if any.  Support for group-wise system redirection for large networks where clients are connected through low-bandwidth lines  Support for exporting groups directly using the .csv files  Scan and Schedule Scan is supported for Linux endpoints also.  Support for EPS Messenger  License history available now which lets you know when you have updated the license, applicable number of endpoints, packs added, removed, license renewal and validity related information.  Source of Infection feature will help administrators to locate the source of malicious files being dropped on the endpoints on the network.  Entirely new Dashboard with Status, Security, and Compliance views which helps the administrator to easily look up the needed information.

Available flavors Quick Heal Endpoint security is available in the following two flavors:  Total  Business

2 Introducing Quick Heal Endpoint Security

The following table lists the features that are available in the flavors:

List Status

Business Total Antispam X IDSIPSProtection

Firewall

Antiphising

Browsing Protection

Web Security X Application Control X Advanced Device Control X Tuneup X PC2Mobile X Vulnerability Scan (VS)

File Activity Monitor(FAM) X Asset Management

Feature Pack Definition: EPS 6.0

Pack Name Features

Productivity Antispam + Web Security

Compliance Application Control + Advanced Device Control + File Activity Monitor Performance Tuneup

DLP Data Loss Prevention

Network Deployment Scenarios

Network setup differs from organizations to organizations depending on their size and architecture. Some organizations prefer a simple network setup with one server and multiple clients while some others may prefer a network setup with subnets or DHCP servers. Also, an organization with a huge network setup may have a single server with multiple LAN cards catering to the needs of networks with different IP ranges.

3 Introducing Quick Heal Endpoint Security

Quick Heal realizes the challenges of varying network setups in different organizations. Therefore, we have provided recommendation for three prominent network setups below:

Scenario 1 Installing Quick Heal Endpoint Security on a network with subnets configured using static IP address.

Network Setup Description The entire network is configured using static IP addresses and the network comprises of subnets connected to the main server. Quick Heal Endpoint Security is installed on the server and Quick Heal client agents are deployed on the endpoint systems in the subnet.

Quick Heal Recommendation  Before installation, ensure that the server and endpoints are connected. Verify this by pinging server to the endpoints and vice versa.  The server system should be configured using static IP address.  During installation of Quick Heal Endpoint Security, select IP Address in the Server Information Screen.

Scenario 2 Installing Quick Heal Endpoint Security on a network with endpoints configured using DHCP server

4 Introducing Quick Heal Endpoint Security

Network Setup Description The entire network is configured using a DHCP server. Quick Heal Endpoint Security is installed on server system and the Quick Heal endpoint agents are deployed on the endpoint systems.

Quick Heal Recommendation  Before installation, ensure that the server and endpoints are connected. Verify this by pinging server to the endpoints and vice versa.  The server system and the DHCP server system should be configured using static IP address.  During installation of Quick Heal Endpoint Security, select an IP address listed in the Server Information screen.

Scenario 3 Installing Quick Heal Endpoint Security on a server using two network cards.

5 Introducing Quick Heal Endpoint Security

Network Setup Description The server consists of two network cards, each catering to a network of different IP ranges (Eg: one network has the IP range of 10.10.0.1 and the other network has the IP Range of 192.168.100.10). Quick Heal Endpoint Security is installed on the server with two network cards and Quick Heal endpoints is installed on all endpoint systems of both the networks.

Quick Heal Recommendation  Before installation, ensure that the server and endpoints are connected. Verify this by pinging server to the endpoints and vice versa. Try to ping using IP address and system name.  The server system should be configured using static IP address.  During installation of Quick Heal Endpoint Security, select Domain Name in Server Information screen. Provide the target server domain name. You can also use Fully Qualified Domain Name (FQDN) of the server if the endpoint has access to a DNS server, which can resolve the FQDN with the endpoint’s IP address.

6

Chapter 2. Getting Started

Quick Heal Endpoint Security (QHEPS) is simple to install and easy to use. During installation, read each screen carefully and follow the instructions.

Prerequisites

Remember the following guidelines before installing QHEPS on your computer:  A machine with multiple antivirus software applications installed may result in system malfunction. We recommend you to remove any other antivirus software/hardware from your server and endpoints before proceeding with the QHEPS installation.  Close all open programs before proceeding with installing QHEPS.  Network should be configured with TCP/IP protocols.  To install on the server, you must have administrator or domain administrator rights on the server.  In order to use Login Script Setup, Windows 2000 Server / Windows 2000 Advanced Server / Windows 2003 Server / Windows 2008 Server / Windows 2008 Server R2 / Windows Server 2012/ Windows Server 2012 R2 should be properly configured with Active Directory services.

System Requirements

Quick Heal Endpoint Security server can be installed on a system with any one of the following operating systems:  Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server  Microsoft Windows XP Professional (32-bit/64-bit)  Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)  Microsoft Windows Vista Home Basic / Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit)  Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)  Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)  Microsoft Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)  Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)

7 Getting Started

 Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)  Microsoft Windows SBS 2011 Standard / Essentials  Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)  Microsoft Windows MultiPoint Server 2012 Standard (64-bit)  Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

Minimum System Requirement for Console System  1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium processor or equivalent  1 GB of RAM  4000 MB of free disk space  Internet Explorer 6 or later  Monitor that supports 1024 x 768 resolution in 256-color mode

Additional Software Required for Console System Console needs to have Web server services of either Microsoft IIS or Apache Web server on the system. If Microsoft IIS is to be configured as Web server, the version requirements are as follows:  IIS Version 5.0 on Windows 2000  IIS Version 5.1 on Windows XP  IIS Version 6.0 on Windows Server 2003  IIS Version 7.0 on Windows Vista and Windows Server 2008  IIS Version 7.5 on Windows 7 and Windows Server 2008 R2  IIS Version 8.0 on Windows 8 and Windows Server 2012  IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2

If Apache is to be configured as Web server, the version requirement is as follows:  Apache Web Server 2.0 or later

Other Essential Configuration on Console System  Administrator or Domain Administrator access on the console system.  File and printer sharing for Microsoft Networks installed.  Transmission Control Protocol/Internet Protocol (TCP/IP) support installed.  Internet Explorer Version 7, 8, 9, 10, or 11.

8 Getting Started

Endpoint side requirements Windows Workstations supported  Microsoft Windows 2000 SP 4 Professional / Server / Advanced Server  Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit/64-bit)  Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)  Microsoft Windows Vista Home Basic / Home Premium / Ultimate / Business / Enterprise (32-bit/64-bit)  Microsoft Windows Server 2008 Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)  Microsoft Windows Server 2008 R2 Web / Standard / Enterprise / Datacenter (64-bit)  Windows 7 Home Basic / Home Premium / Professional / Enterprise / Ultimate (32- bit/64-bit)  Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)  Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)  Microsoft Windows SBS 2011 Standard / Essentials  Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)  Microsoft Windows MultiPoint Server 2012 Standard (64-bit)  Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)

Minimum System Requirements for Windows Endpoint  1 GB of RAM  1800 MB of free disk space  1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista, Windows 2008 Server and Windows 7  For Windows 2000 – Service Pack 4 or later  Internet Explorer 5.5 or later  Administrative privilege is required for installation

Supported Mac Endpoints  Mac OS X 10.6, 10.7, 10.8, 10.9, 10.10  Mac Computer with Intel Processor

Minimum System Requirements for Mac Endpoint  512 MB of RAM

9 Getting Started

 1200 MB free hard disk space

Supported Linux Endpoints 32-Bit:  Red Hat Enterprise Linux 6.4  Fedora 12, 13, 14, 15, 16, 17, 18, 19, 20  SUSE ES 11 SP2  openSUSE 11.3, 11.4, 12.1, 12.2, 12.3, 13.1  BOSS 4  Mandriva 2010.1, 2010.2, 2011  CentOS 6.4  Ubuntu 10.4 LTS, 10.10, 11.04, 11.10, 12.04 LTS, 12.10, 13.04, 13.10 64-Bit:  CentOS 6.2  Fedora 18, 19  openSUSE 12.1  Ubuntu 12.04.3 LTS, 13.04, 13.10 Minimum System Requirements for Linux Endpoint  512 MB of RAM or higher  1 GB free hard disk space  Intel based processor (or compatible), 300 MHz or higher Note: The requirements outlined are minimum system requirements. We recommend that your system should have higher configuration to obtain best results. To check for the latest system requirements, visit: www.quickheal.com.

Installing Quick Heal Endpoint Security on Windows Operating System

To begin installation using the Quick Heal Endpoint Security DVD, follow these steps: 1. Insert the Quick Heal Endpoint Security DVD in the CD/DVD drive. 2. The autorun feature of the CD/DVD is enabled and it opens an installation screen automatically. Follow the instructions carefully.

10 Getting Started

Sometimes the CD/DVD drive does not start automatically when DVD is inserted. In such a case, follow these steps for installation: 3. Double-click My Computer or the Computer icon on the Desktop. 4. Right-click CD/DVD drive and select Explore. 5. Double-click Autorun.exe. To continue with the installation, follow these steps: 1. On the installation screen, click Install. 2. On the installation wizard, click Next. The license agreement appears. Read the License Agreement carefully. 3. Select I agree to accept the license agreement and then click Next. 4. Click Browse if you want to install Quick Heal Endpoint Security on a different location. To proceed with installation the default path, click Next. The Quick Heal Endpoint Security installer will scan your system for virus infection and verify the installed system components. 5. Select one of the following Web servers: i. IIS Server: Select IIS Server to install Quick Heal Endpoint Security on an existing IIS installation. If the IIS Server is not installed /configured, you can proceed with the

11 Getting Started

installation using Apache Web Server 2.0 provided in the Quick Heal Endpoint Security installer. ii. Apache Web Server: Select Apache Web Server to install Apache 2.0 on an existing installation. If an Apache Web server version 2.0 or later installation is not found, it will be installed automatically. 6. Click Next. 7. On the server information screen, select one of the following: i. Domain Name: Provide the target server domain name. You can also use Fully Qualified Domain Name (FQDN) of the server if the endpoint has access to a DNS server, which can resolve the FQDN with the endpoint IP address. ii. IP address: Provide the IP address of the target server. However, selecting IP address is not recommended if your network is configured using DHCP. 8. Under HTTP Port number, type a port to use as the server listening port. The Quick Heal Endpoint Security server address will be the following: http://{Quick_Heal_Endpoint_Security_Server_name}:{port number}/qhscan6 9. You can also enable Secured Socket Layer (SSL) security. Select the Enable Secure Socket Layer check box and type an SSL port number. If you enable SSL, this port number will serve as a listening port for the server. The Quick Heal Endpoint Security server address will be as follows: https://{Quick_Heal_Endpoint_Security_Server_name}:{port number}/qhscan6 10. Click Next. A message appears for your verification about the web server settings. 11. To confirm, click Yes. You can make changes in your setting if required. If you are "using a proxy server on your network" or "using Socks Version 4 & 5 network", you need to enter the IP address (or domain name) and port of the proxy, SOCKS V4 & SOCKS V5 server in the Connection settings. Username and password are mandatory to log on. The following Quick Heal Endpoint Security modules require such changes: Registration Wizard, Update Manager, and Messenger. To enable and configure proxy settings: i. Select Enable proxy settings. ii. Choose HTTP Proxy, Socks V 4 or SOCKS V 5 as per your settings and then perform the following steps:  In the Server text box, type the IP address of the proxy server or domain name (For example, proxy.yourcompany.com).  In Port, type the port number of the proxy server (For example: 80).  In the User name and Password fields, type in your server logon credentials. 12. Click Next. The Endpoint Settings screen appears. Quick Heal will be installed on the endpoint/workstation as per the path specified in this screen.

12 Getting Started

13. Type the endpoint Installation path. Path can be provided using either %PROGRAMFILES% or %BOOTDRIVE% variable. For example: %PROGRAMFILES%\Quick Heal\Quick Heal or %BOOTDRIVE%\Quick Heal. 14. Specify the Client Agent Communication Port. The Quick Heal clients communicates with server to fetch important instructions such as scanning and updates, and submit the log to Endpoint Security Server using this Port Number, so ensure that this port number is not used by any other application in the network. 15. Click Next. A message appears for your confirmation. You can change the port number if required. 16. To confirm, click Yes. The Authentication screen appears. Create Quick Heal Endpoint Security Administrator password to access the Web console and endpoint password to access the endpoint settings at the endpoint side. Confirm the passwords in the text boxes. This helps prevent unauthorized users from accessing the Web console and make changes in your settings or remove the endpoints. Passwords for Administrator and Endpoints must be created. However, the password for Administrator and Endpoint should be different; else the installation will not proceed. The installation summary screen appears. You can change your settings if required. 17. Click Next. A message appears stating that the Network connection on the system will be temporarily disabled if you continue with the Quick Heal Endpoint Security installation on the system. 18. To continue with installation, click OK. The installation starts. Read the important information related to Quick Heal Endpoint Security. 19. Click Next. 20. To register Quick Heal Endpoint Security and configure Update Manager, click Next. If you want to perform these tasks later, clear these options. 21. To complete the installation, click Finish.

Installing Multiple Quick Heal Endpoint Security Server

Quick Heal Endpoint Security multiple server installation is a unique feature of Quick Heal Endpoint Security. Administrators can install latest version of Endpoint Security where the previous versions are already installed. This feature enables Administrators to easily migrate to the latest version of Quick Heal Endpoint Security in simple ways.

Upgrading previous version of Quick Heal Endpoint Security to the latest version Quick Heal Endpoint Security can be upgraded in the following way: 1. Install Quick Heal Endpoint Security on the system where previous version of Endpoint Security is installed.

13 Getting Started

2. Quick Heal Endpoint Security will detect the previous version and will show the following message:

3. To proceed with multi-server installation, click Yes. After the installation of the latest version of Quick Heal Endpoint Security is complete, open the previous version of Quick Heal Endpoint Security and follow these steps: i. Select Admin Settings > Server > Redirection. ii. In Server Name/IP text box, type the Server Name or IP Address of the latest version of Quick Heal Endpoint Security. iii. In Port text box, type the port number of the latest version of Endpoint Security. iv. Click Apply. This will send a notification about the latest version of Quick Heal Endpoint Security to all Quick Heal endpoints and they would be redirected to the latest version. 4. The latest version of Quick Heal Endpoint Security will check if there are any previous version of endpoints in the network. If detected, Quick Heal Endpoint Security will automatically uninstall the previous version of endpoints and install the latest version. 5. After all the endpoints are upgraded, you can uninstall the previous version of Quick Heal Endpoint Security from the system. Before uninstallation, note down the Product Key and Activation Number of your Quick Heal Endpoint Security that will be required for re-activation of the latest version of Quick Heal Endpoint Security. 6. After uninstallation of the previous version of Quick Heal Endpoint Security, re-activate the latest version of Quick Heal Endpoint Security with your existing Product Key and Activation Number.

14 Getting Started

 You can upgrade all the endpoints to the latest version within 30 days period only.  If you have configured previous version of Quick Heal Endpoint Security site with IIS on Windows XP and 2K-based system and with SSL support enabled, you will not be able to configure later version of Quick Heal Endpoint Security site with SSL support on the operating systems mentioned in the preceding section. In this case, you can install the latest version of Quick Heal Endpoint Security with Apache Web Server.  If you have installed a previous version of Quick Heal Endpoint Security, do not uninstall Apache Server during uninstallation of the previous version of Quick Heal Endpoint Security.

15

Chapter 3. Post Installation Tasks

Quick Heal Endpoint Security must be registered immediately after installation to activate the copy, else endpoint deployment will not start.

Registration

Quick Heal Endpoint Security is simple to register.

Registering Online If your system is connected to the Internet, you can register Quick Heal Endpoint Security online in the following way: 1. Go to Start > Programs > Quick Heal EPS Console 6.0 > Activate Quick Heal EPS Console. 2. On the Registration Wizard, type the Product Key and then click Next. 3. Type relevant information in the Purchased from, Register for and Name text boxes and then click Next. 4. Type your personal details such as organization’s email address, administrator email address, contact number, and location details. 5. Click Next. A confirmation screen appears with the information that you have entered. You can change your information if required. To change your information, click Back to go to the previous screen and make the required changes. 6. To confirm, click Next. It takes a few seconds to register and activate your copy. Please stay connected to the Internet during this process. After the activation completes successfully, a message appears with the License validity information for your reference. 7. To close the Registration Wizard, click Finish.

You can find the Product Key on the User Guide or inside the box. If you have purchased the software online using credit card, you will find the Product Key in the email confirming your order.

Internet Settings When you open the registration wizard, the system tries to connect to the direct Internet connection. If the default Internet connection is not found, it shows the message “System is not connected to the Internet. Please connect to Internet and try again”. If you have alternative ways to connect to the Internet, follow these steps to connect to the Internet and register online:

16 Post Installation Tasks

1. Click the Internet Settings button. 2. The Configure Proxy Settings screen appears. 3. To set the proxy setting for Internet, select Enable Proxy Setting. The proxy settings details are activated. 4. In the Sever text box, type the sever name. 5. In the Port text box, type the port number. You can also set authentication rule if you use Firewall or proxy server. For this, type the user name and password in the Authentication dialog box. 6. To save your setting, click OK. 7. Click Retry to connect to the Internet. If you are connected to the Internet, the online activation wizard opens and you can activate your product online.

Reactivation

This section includes the following:

Reactivating Quick Heal Endpoint Security Re-activation is a facility that ensures that you use the product for the full period until your license expires. Re-activation is very helpful in case you clean your endpoint where all software products are removed, or you want to install Quick Heal Endpoint Security on another endpoints. In such cases, you need to re-install and re-activate Quick Heal Endpoint Security on your system. The re-activation process is similar to the activation process, with the exception that you need not type the complete personal details again. On submitting the product key, the details are displayed. Complete the process by verifying the details. Note: If your license has expired and you try to reactivate it, a message about it is displayed.

Configuring Update Manager Update Manager is a tool integrated with Quick Heal Endpoint Security. It is used to download and manage the updates for Quick Heal Endpoint Security. It provides you the flexibility to download the updates on a single machine. All the Quick Heal Endpoint Security clients fetch the updates from this centralized location. It also provides the facility of automatically updating Quick Heal Endpoint Security for enhancements or bug fixes.

How to Open Update Manager To open Update Manager, select Start > Programs > Quick Heal EPS Console 6.0 > Update Manager.

17 Post Installation Tasks

Update Manager includes the following features:

Status Status includes information about the latest updates downloaded by Update Manager. It displays the version, service pack, and virus database date of the product.

Configuration Configuration helps you customize and configure Update Manager. To access configuration, follow these steps: 1. Select Start > Programs > Quick Heal EPS Console 6.0 > Update Manager. 2. Click Configuration. 3. Type the Super Administrator and Password and then click OK. 4. If you want to take the updates automatically, select Enable Automatic Updates. This feature is enabled by default. Quick Heal recommends that you do not disable this feature. 5. Select the update mode from the following:  Internet Center – Helps you download the updates to your system from the default Internet Center.  Specified URL: Helps you take the files for updates from a different endpoint using the updates downloaded by the connected system. o In Server, type the URL. o In Port, type the port number. Note: msg32.htm file should be present at the update location where the updates are downloaded in the system with an Internet connection. To create msg32.htm file, rename a text file as msg32.htm file.  Specified path – Helps you pick the updates from a specified folder of local system without an internet connection, you can specify the path of the local folder where the updates have been copied from the other system. For example, if you have downloaded the updates on other system, you can copy them into a CD/DVD or pen drive and then paste in the local folder and Update Manager will fetch the updates from this local folder path.  Select the Pick from specified Path option.  Type or browse the path to the folder where the updates have been copied in the local system.  Service Pack: Helps you download the Quick Heal Endpoint Security Service Pack. This feature is enabled, by default. 6. Select one of the following:  ownload updates to: Helps you download the updates to the location as preferred by you. All Quick Heal Endpoints will take the updates from this centralized location.

18 Post Installation Tasks

 Always take backup before downloading new update: Helps you take the backup of the existing updates before new updates are downloaded. These backups are used in case a rollback to previous update is required. This feature is enabled, by default.  Delete report after: Helps you delete the reports as per the time interval specified by you in the drop-down box. This feature is enabled, by default. The preset value of time interval in the drop-down box is 10 days. 7. To save your changes, click Apply. 8. To restore the default settings, click the Default button. Following are the two buttons that are accessible at all times:  Update Now  Rollback

Fields Definitions

Update Now Helps you download the updates of Quick Heal Endpoint Security. Rollback Helps you take the Update Manager back to the previous update state. This feature will work only if the Always take backup before downloading new update option is selected in the Configuration section of Update Manager. The steps for performing Rollback are as follows:  Click the Rollback button. The Quick Heal product for the Endpoint Security is displayed.  After confirming the products to be rolled back, click the Rollback button on the displayed screen or else click Close to exit the dialog box.

Connection Settings If a proxy server is being used on the network, you need to provide the IP address (or domain name) and the port number of the proxy server in the Connection Settings. To access Connection Settings, follow these steps: 1. Select Start > Programs > Quick Heal EPS Console 6.0 > Update Manager. 2. Click Connection Settings. 3. Type the Super Administrator Password and click OK.

19 Post Installation Tasks

To enable HTTP proxy settings, follow these steps: 1. In the Connection Type list, select HTTP. 2. Select Enable Proxy. 3. In Proxy Type, select HTTP Proxy / Sock4 / Sock5. 4. In Server, type the IP address of the proxy server or domain name (e.g. proxy.yourcompany.com). 5. In Port, type the port number of the proxy server (e.g. 80). 6. If required, type your logon credentials in User Name and Password fields to Authenticate in case of firewall or proxy server section. 7. To save the changes, click Apply. 8. To restore the default settings, click the Default button.

Reports The Reports section includes a log of updates or rollback activity. It provides the details such as Date, Time, and Status of the updates or rollback activity. To access Reports, follow these steps: 1. Select Start > Programs > Quick Heal EPS Console 6.0 > Update Manager. 2. Click Reports. You can perform the following actions on reports:

Fields Description

View Select a report and click View to get the complete details of the downloaded update or rollback. Delete Select a report and click Delete to delete the report. Delete All Click Delete All to delete all the reports in the section. Previous Helps you view the previous report. Next Helps you view the next report. Save As Helps you save a copy of the report in text format on your local machine. Print Helps you take a printout of the report. Close Helps you exit from the report window.

Uninstalling Quick Heal Endpoint Security

Uninstalling Quick Heal Endpoint Security may expose your systems and valuable data to virus threats. However, if you need to uninstall Quick Heal Endpoint Security, follow these steps: 1. Go to Start > Programs > Quick Heal EPS Console 6.0 > Uninstall EPS Console. 2. Quick Heal Endpoint Security Uninstaller will prompt for the Password.

20 Post Installation Tasks

3. Type Super Administrator Password. 4. Click Next. 5. After the uninstallation, the product key is displayed. Note down the product key as you might require it when you re-install the Quick Heal Endpoint Security. Select Restart System Now to restart the system immediately or Restart system later to restart system later. 6. To complete uninstallation of Quick Heal Endpoint Security, click Finish.

 If you have assigned a script to install endpoint by Login Script Setup to domain servers, clear it through the Login Script Setup before proceeding with uninstallation.  If you have configured the Quick Heal Endpoint Security site with Apache Web Server, the uninstallation wizard will prompt you to uninstall Apache Web Server. Select Uninstall Apache Server only if no other site is running on Apache.  Before proceeding with uninstallation, ensure that all other running programs are closed.

21 About Quick Heal Endpoint Security Dashboard

Chapter 4. About Quick Heal Endpoint Security Dashboard

Quick Heal Endpoint security has a web-based graphical console that displays the current status of the health of endpoints and highlights critical security situations that need immediate attention. This section explains how to navigate the web console. To open the Web console:  Open the browser on a system in your network and type: http://{Quick_Heal_Endpoint_Security_Server_name}:{port number}/qhscan6.  If your system uses SSL, type: https://{Quick_Heal_Endpoint_Security_Server_name}:{port number}/qhscan6 The Quick Heal Endpoint Security Home page appears.  Type the user name as ‘administrator’ in the User Name text box and Super Administrator Password in the Password text box, and then click the Login button. The web console appears with a summary of the current health status of the network.

Areas on the web console

When you log on to the Quick Heal Endpoint Security console, the Home page is displayed by default. The options that appear on the console are as follows:

The menu bar on the upper most right corner highlighted in yellow includes the following options that are common to all pages:

Menus Description

Admin Settings Helps you configure the settings related to the features such as Server and Endpoints. Support Helps you find out all the support options that Quick Heal provides. Help Includes the Help file that helps you know about all the features, how they work and how to configure them.

Logout With this button, you can log out from the current session. Product name:

22 About Quick Heal Endpoint Security Dashboard

The product name section includes the following:

Menu Description

Product Name and Displays the product name and its current version. Version

The user interface of the web console also includes the links to the following pages:

Pages Description

Home Helps you visit the Home page, which is the Quick Heal Endpoint Security Dashboard. Clients Helps you configure the settings related to Endpoint Status and Endpoint Action. Settings Helps you configure the settings related to Endpoint Settings and Schedule Settings. Reports Helps you generate reports on all the features that you need. Alerts (Bell Icon) Displays alert messages for the following critical situations:  Update Manager not updated  License expired  License limit exceeded  License about to expire  New service pack available  SMS credit limit has been reached to maximum Messenger Displays the messages related to security information, new service pack released, new EPS version released etc.

23 About Quick Heal Endpoint Security Dashboard

Dashboard Area

The dashboard area on the Home page has widgets for the following:

Overview

Feature Description

Product version Displays the product version along with the build number. The build number is useful for troubleshooting purposes. The EPS service Pack information is available. It also includes virus database date that helps in understanding if your version is updated or whether it needs updates. Update Manager Link for running the Update Manager. See Update Manager for more information. View license Displays the links for: Status: Displays currently held licensee information, installation number, product key, product type, validity and the maximum number of Endpoints permitted. License order form: Displays the License order form to order new feature/license License History: Displays the license history details. Threat Level Displays current threat level of your network. The threat levels include: Normal: Indicates that 12% of the endpoints detected viral infection in last 24 hours. Elevated: Indicates that 24% of the endpoints detected viral infection in last 24 hours. High: Indicates that 36% of the endpoints detected viral infection in last 24 hours.

24 About Quick Heal Endpoint Security Dashboard

Feature Description Critical: Indicates that more than 36% of the endpoints detected viral infection in last 24 hours. Important: Thorough scanning of the entire network is recommended if the threat level alert is High or Critical. Alert An alert appears if the health of the network needs an immediate action. Click the More link to see all the alerts. (The More link is displayed only if multiple alerts are available.) You can take appropriate action to fix the issue.

Network Health

Feature Description

Network Health Graphical representation of the network health for the categories of Virus and Phishing, Click the respective tab to get the details of that category. It shows how secure your system is currently. This status is displayed over a 4- level grid by colored dots that are in ascending level with green at the lowest level and red at the highest level. These colored dots indicate the following: Green (Normal): Indicates endpoint is not infected and is secure. Yellow (Elevated): Indicates low level of endpoint infection. Orange (High): Indicates high level of endpoint infection that requires immediate action. Red (Critical): Indicates critical level of endpoint infection that requires immediate action. The right pane carries a table with Top Attacks, the type and the total number of endpoints affected. View for drop Gives a graphical representation of the network health for the selected time down list period. The graphs can be viewed for the following time periods:  Past 7 Days: Displays the report of the last seven days.  Today: Displays the report of the today’s infection.  Past 15 Days: Displays the report of the last 15 days.  Past 30 Days: Displays the report of the last 30 days. Top Attacks Displays the top attacks on systems by Attack Name, type, number of endpoints infected. Clicking the endpoint count opens a window with details of the actual endpoint infected.

Status

Feature Description

Status Tab Displays the information for the following categories:  Protection  Connection  Update Protection Displays the number of endpoints deployed in the network, unprotected endpoints across your network and the endpoints on which deployment of any client has failed. Connection Displays the total number of connections registered to the system with the break- up for online, offline and disconnected endpoints. Also displays information about

25 About Quick Heal Endpoint Security Dashboard

offline endpoints and Disconnected endpoints and when they last connected. Update Displays the number of endpoints on which the Virus definitions are not up-to- date. Click the number under the category to check information about the Endpoint name, Domain, IP address, and Virus Database date. Enumerate Click Enumerate to generate a list of all the unprotected endpoints connected to the network. Note: This may take some time and a link to a list of all these endpoints with their endpoint name, domain name and operating system platform name will be displayed.

Security

Feature Description

Security Tab Displays the protection status for the following :  Virus protection  Phishing protection  Browsing Protection

Web Security Displays the information for top 5 website categories, which were blocked in past 7 days in graph and a list of the top 5 websites which were blocked in past 7 days in table with URL, type and count columns. Note: This feature is optional and will be visible only if you have purchased the license for Web Security feature. See Web Security for more information. Data Loss Displays the number of data leak attempts over last 7 days and a list of the top Prevention users who were trying to leak the data. Note: This feature is optional and will be visible only if you have purchased the license for DLP. See Data Loss Prevention for more information. Vulnerabilities Displays the number of affected endpoints and a comparative list of the top vulnerabilities, severity level and the total number of vulnerabilities detected. Also, displays a graphical widget for the listed data.

Compliance

Feature Description

Advanced Displays the information for top device types that breached the policies in past 7 Device Control days and a list of the top 5 user who were associated with it specifying the user name, endpoint name and the count of breaches. Application Displays the information for top applications that were blocked in the past 7 days control and a list of the top 5 users who attempted to access the blocked applications specifying the user name, endpoint name and count.

Assets

Feature Description

Hardware Displays the number of hardware changes detected on EPS 6.0 endpoints only changes for endpoints with Windows operating system.

26 About Quick Heal Endpoint Security Dashboard

Software Displays the number of software changes detected on EPS 6.0 endpoints only for changes endpoints with Windows operating system. Platforms Displays the total number of endpoints installed on that platform. Click the columns in the bar graph to display extended information related to a specific category. The endpoint IP address is displayed along with the platform on which it was installed. Note: This feature is applicable to all endpoints for Windows, Linux, and MAC operating systems. Software Displays the number of endpoints which contain installed software(s). it is also in Installed the form of a bar graph which can be toggled to display the number of software least installed v/s the number of software most installed. Click on the columns in the bar graph to display extended information related to a speific category. The endpoint IP address is displayed along with the software name. This feature is applicable only for endpoints with Windows operating system.

27

Chapter 5. Clients

The Clients page includes features that help you manage and control all the clients deployed in the network. You can verify the current status of the clients and carry out various activities. You can scan endpoint computers, update the software application, improve system performance, install and uninstall Quick Heal Endpoint Security Client remotely. You can also manage endpoint groups, create and apply scanning policies and so on.

The following features are available in the Clients tab as shown in the above screen:  Client Status  Client Action  Client Deployment  Manage Groups  Manage Policies  Assets

Client Status tab

Client Status tab gives the status of all the endpoints in the network. The status includes endpoint name, group name, domain name, IP and MAC addresses. The tab also shows protection status, installation status, product version, virus database date, last scan date, protection polices among others, and the enabled security features. To view the Client Status, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Status. 2. Under EPS Console, select a group name. 3. In the right pane, all the endpoints of a relevant group are displayed. 4. Select an endpoint and click View Status. The status of the selected endpoint appears. It also includes a View Installer Log link that helps you view if Quick Heal is not installed on any Client endpoints. Click the View Installer Log link to view the reason why a client failed to deploy.

28 Clients

You can either export the status or take a print out if required.

Terms Definition

Show endpoints Helps you view endpoints that are in a within subgroup subgroup. View Status Helps you view the status of the clients. Remove Client Helps you remove an offline client from a group. Search Helps you search the client by endpoint name. CSV Helps you save the report in CSV format.

Client Action tab

Using the features on the Client Action tab you can, scan endpoints remotely, update virus definitions, and improve performance of the endpoints. You can also verify the compliance to security policies, for e.g. identifying unauthorized applications installed on any of the endpoints in the network. You can remotely scan individual endpoints or endpoints in a group, customize scan settings and stop scanning as per your preference. You can improve the performance of your endpoints by cleaning up disk space, registry entries, and schedule defragmentation at next boot. You can update the QHEPS virus database for the endpoints and verify security compliance if any unauthorized applications are installed on any endpoints. The following table shows a comparison of the features in Client Action that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Scan Update Tuneup X X Application Control Scan X X Vulnerability Scan X X

Scan This feature allows remote scanning of any endpoint in the network. You can initiate a manual scan with preconfigured policies. This feature reduces the additional task of personally overseeing each target endpoint. To initiate scanning, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action. 2. Click Scan.

29 Clients

A window displaying all the groups appears. Each group includes the names of endpoints belonging to that group. 3. Under EPS Console, select a group. In the right pane, all the endpoints of a relevant group are displayed. 4. To initiate scanning, click Notify Start Scan. The selected endpoints are scanned for compliance. You can stop scanning by clicking Notify Stop Scan or stop sending notification by clicking Stop Notification any time you prefer.

Terms Definition

Show offline clients Helps you view the endpoints that are not online or are disconnected from the network. Show endpoints within Helps you display the endpoints that are in a subgroup. subgroup Scan Settings Helps you customize scan settings. Notify Start Scan Helps you notify the clients to start scanning. Notify Stop Scan Helps you notify the clients to stop scanning. Stop Notification Helps you stop notification.

Scan Settings This feature allows you to customize the scan settings for a client machine. To configure Scan settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action > Scan. 2. On the Scan screen, click Scan Settings. 3. On the Scan Settings screen, carry out the following: i. Select either Quick Scan or Full System Scan. Quick Scan includes scanning of the drive where operating system is installed and Full System Scan includes scanning of all fixed drives. ii. Select either Automatic or Advanced scan mode. Automatic scanning involves optimum scanning and is selected by default. iii. Under Select the items to scan, select the files, file types (executable files, packed files, archive files), and mailboxes that you want to scan. iv. In Archive Scan Level, set the scan level. You can set the level for scanning in an archive file. The default scan level is 2. Increasing the default scan level may affect the scanning speed. v. To remove an infected file from your system follow the below steps in the Select action tab:

30 Clients

. If an infected file is found in your active folder/drives on you system, select whether you want to repair, delete, or skip the file. . If an infected file is found in an archived folder on your system, select whether you want to delete, quarantine, or skip the file. vi. Under Antimalware Scan Settings, select Perform Antimalware scan if required. vii. In Select action to be performed when malware found select an action from the following: . Clean . Skip viii. Under Boot Time Scan Settings, select Perform Boot Time Scan. The Select Boot Time Scan Mode option is activated. ix. Select one of the following scan options: . Quick Scan . Full System Scan The setting for Boot Time Scan is applied only once and is not saved. x. After configuring the scan setting, click Apply. The new setting is applied.

 Scan packed files, Scan mailboxes, Antimalware Scan Settings, and Boot Time Scan Settings are available only in the clients with Windows operating systems.  Notification for Scan from QHEPS web console will not be sent if the user is not logged on to the Mac system.

Update Using this feature, you can update the client applications on any endpoint in the network remotely. Quick Heal releases updates regularly to fix technical issues and provide protection against new threats. Hence, it is recommended that the protection software to be updated regularly for the latest virus definitions. To update, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and select Clients > Client Action. 2. Click Update. A window displaying all the groups appears. Each group includes the names of endpoints belonging to that group. 3. Under EPS Console, select a group. In the right pane, all the endpoints of a relevant group are displayed. 4. Select an endpoint and then click Notify Update Now. The selected endpoints are updated with latest virus definitions. 5. To stop the update notices, click the Stop Notification button.

31 Clients

Terms Definition Select endpoints with Helps you update endpoints with outdated virus out-of-date Quick Heal definitions. Show endpoints within Helps you display endpoints that are in a subgroup. subgroup Notify Update Now Helps you notify endpoints to update Quick Heal. Stop Notification Helps you stop update notices.

Notification for update from QHEPS web console will not be sent if the user is not logged on to the Mac system.

Tuneup This facility improves the performance of the endpoints by defragmentation and by cleaning unwanted and junk files and invalid and obsolete registry entries. While you work in applications, computers write junks on the drives or when you visit websites, temporary files are created on your system. Such junks and files occupy spaces in memory resulting in slowing down of the endpoints. Tuning up your computers cleans up these files improving their performance.

 The Tuneup feature is available only in the clients with Windows operating systems.

 The Tuneup feature is not available for Windows Server operating system.

To tune up the endpoints, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action. 2. Click Tuneup. 3. A window displaying all the groups appears. Each group includes the names of endpoints belonging to the group. 4. Under EPS Console, select a group for which you want to perform Tuneup. By default it shows all the endpoints present under the EPS console. In the right pane, all the endpoints of a relevant group are displayed. 5. Select an endpoint and then click Notify Start Tuneup. Tuneup notifications are sent to the selected endpoints and Tuneup is performed on those endpoints. You can stop Tuneup activity by clicking Notify Stop Tuneup or stop notification by clicking Stop Notification button any time you prefer.

Terms Definition

Show offline clients Helps you view the endpoints that are not online or disconnected from the network. Show endpoints within Helps you display those endpoints that are subgroup in a subgroup. Tuneup Settings Helps you customize Tuneup settings.

32 Clients

Notify Start Tuneup Helps you notify the clients to start Tuneup. Notify Stop Tuneup Helps you notify the clients to stop Tuneup. Stop Notification Helps you stop notification.

Tuneup Settings These settings allow you to carry out different types of cleanups such as disks, registry entries, or schedule a defragmentation at next boot. To customize Tuneup settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action > Tuneup. 2. On the Tuneup screen, click the Tuneup Settings button. 3. On the Tuneup Settings popup, select any of the following:  Disk Cleanup  Registry Cleanup  Defragment at next boot Default options are preselected. 4. To save your settings, click Apply. Disk Cleanup: Helps you find and remove invalid/unwanted junk files from hard disk. These files consume hard disk space and slow down the system considerably. Disk Cleanup deletes these files freeing up space that to be used for other applications and helps in improving system performance. This feature also deletes temporary files, internet cache, improper shortcut, garbage name files and empty folders. Registry Cleanup: Helps you remove invalid and obsolete registry entries from the system, these may appear due to improper uninstallation, non-existent fonts, and so on. Sometimes during uninstallation, the registry entries are not deleted. This leads to slower performance of the system. The Registry Cleanup removes such invalid registry entries to boost the performance of the system. Defragment: Helps you defragment vital files, such as page files and registry hives for improving the performance of the system. Files are often stored in fragments in different locations slowing down system performance. Defragment reduces the number of fragments and clubs all the fragments into one contiguous chunk to improve system performance.

Application Control Scan This allows you to check whether security compliance policies framed by your organization are being followed on each endpoint. It also helps you in verifying whether endpoints have any unauthorized applications other than the authorized ones running on them.

The Application Control Scan feature is available only in the clients with Windows operating systems.

To scan endpoints for compliance control, follow these steps:

33 Clients

1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action. 2. Click Application Control Scan. A window displaying all the groups appears. Each group includes the names of endpoints belonging to the group. 3. Under EPS Console, select a group. In the right pane, all the endpoints of a relevant group are displayed. 4. With the Scan Settings button, select your scan setting. 5. Select an endpoint and then click Notify Start Scan. The selected endpoints are scanned for compliance. You can stop scanning by clicking Notify Stop Scan or stop sending notification by clicking Stop Notification any time you prefer.

Terms Definition

Show offline clients Helps you view the endpoints that are not online or disconnected from the network. Show endpoints within Helps display the endpoints that are in a subgroup. subgroup Scan Settings Helps you customize the scan settings for application control. Notify Start Scan Helps you notify the clients to start scanning. Notify Stop Scan Helps you notify the clients to stop scanning. Stop Notification Helps you stop notification.

Scan Settings This feature helps you customize your scan preference. To customize Scan Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action > Application Control Scan. 2. On the Application Control Scan, click the Scan Settings button and then select any of the following:  Unauthorized applications: Helps you initiate scanning for unauthorized applications, present on the client’s endpoint.  Unauthorized and authorized applications: Helps you initiate scanning both for unauthorized and authorized applications present on the client’s endpoint.  All installed applications: Helps you initiate scanning for all applications installed on a client. You can select any one of the options for application control scan. Scanning by first two options may take longer time. 3. To save your settings, click Apply.

34 Clients

Vulnerability Scan This feature allows you to scan the known vulnerabilities in the installed applications of various vendors such as Adobe, Apple, Mozilla, Oracle etc. and the operating systems on the endpoints in your network and assess their security status. You can probe the endpoints for applications, and operating system patches for possible vulnerabilities. This is helpful to create security measures against the known vulnerabilities and secure the endpoints against data outage. To enable Vulnerability Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Action. 2. Click Vulnerability Scan. 3. On the Vulnerability Scan page, click the Scan Settings button. The Scan Settings dialog appears. 4. Under Scan for vulnerability against following software vendors, select any of the following:  Microsoft applications and other vendor applications  Microsoft applications only  Other vendor applications only 5. To save your settings, click Apply.

35

Chapter 6. Client Deployment

The Client Deployment tab on the Clients page helps you synchronize Active Directory groups to remotely deploy and install Quick Heal Endpoint Security Client on endpoints. You can also make a compressed Quick Heal Endpoint Security Client setup Package which is self-extracting file to simplify delivery through email, CD-ROM, or similar media. You can also enable login script setup to deploy Quick Heal Endpoint Security Client on remote systems when they log on to the selected domain or deploy Quick Heal Endpoint Security Clients through imaging. It also allows you to uninstall clients remotely. The following table shows a comparison of the features in Client Deployment that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Through Active Directory X X Remote Install X X Notify Install X Client Packager X Login Script X X Disk Imaging X X Remote Uninstall

Through Active Directory

This feature helps you sync with Active Directory groups. Once you sync the group, the clients will get installed on all the endpoints which come under your domain network. A periodic check is carried out to find if any new endpoint is added to your network. When a new endpoint is added, the client gets automatically installed on that endpoint. You can also exclude certain endpoints from the Active Directory group so that the client is not installed on these endpoints. Notes:  This installation method is available only with Microsoft Windows operating system.  To synchronize with Active Directory your console should be installed on the domain machine or should be a member of the domain.  Synchronization cannot be done with Default group.  Groups shown in Red Color are already synched with Active Directory.

36 Client Deployment

 The user should have permissions of Domain Admins to synchronize with Active Directory.  The default synchronization time interval is GLOBAL.

Synchronizing with Active Directory To sync Active Directory groups, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Deployment. 2. Click Through Active Directory. A window appears with all the groups. 3. Under EPS Console, select a group. In the right pane, Active Directory Container and Synchronization Interval of the selected group are displayed, if already synched. 4. Right-click a group and select Synchronize with Active Directory. The Select a Domain screen appears. 5. Select a domain and click Next. The Authentication screen appears. 6. Specify the user name in the format of "domain name\username" and enter a valid password and then click Next. The Select Active Directory Container screen appears. 7. Select Domain Name or Active Directory Container for Synchronization. If you select a Domain Name, the whole Active Directory gets synched and if you select any Active Directory Container then only the selected container gets synched. 8. Click Next. The Synchronization screen appears. 9. In Synchronization Interval, type the time interval when a periodic check is to be performed for this group and then click Finish. Time should be specified between 1 to 24 hours. The directory is successfully synched.

Editing Synchronization This feature gives you the flexibility to edit the time interval for carrying out periodic checks to find if a new endpoint is added to the network. The frequency can be changed depending on how many and how often new endpoints are added. To edit the time interval, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and the select Clients > Client Deployment.

37 Client Deployment

2. Click Through Active Directory. A window appears with all the groups. 3. Under EPS Console, right-click an already synched group and click Edit Synchronization. The authentication screen for Synchronization with Active Directory appears. 4. Type the password and click Next. The Synchronization screen appears. 5. In the Synchronization interval text box, type the time interval. Time should be specified between 1 to 24 hours. 6. To save the new setting, click Finish. New synchronization setting is saved successfully.

Removing Synchronization With this feature, you can remove the synchronization of a group in the following way: 1. Log on to the Quick Heal Endpoint Security Web Console and then select Clients > Client Deployment. 2. Click Through Active Directory. A window appears with all the groups. 3. Under EPS Console, right-click a group that has already been synchronized and click Remove Synchronization. The synchronization of the selected group is removed successfully.

Exclusion With this facility, selected workstations can be excluded from having the EPS Console client installed on them. You can exclude workstations by Host Name, IP Address or IP Range. To exclude a workstation, follow these steps: 1. Log on to the Quick Heal Endpoint Security Web Console and then select Clients > Client Deployment > Through Active Directory. 2. On the Through Active Directory page, click the Exclusion button. A popup appears with the options about how you want to exclude a workstation. 3. On the Exclude Workstations screen, select one of the following:  Exclude by Host Name: If you select this option, type the Host Name and click Add. The workstation is added to the Excluded Workstations list.  Exclude by IP Address: If you select this option, type the IP address and click Add. The workstation is added to the Excluded Workstations list.  Exclude by IP Range: If you select this option, type the Start IP Range and End IP Range details and click Add. The workstations are added to the Excluded Workstations list.

38 Client Deployment

4. To save your settings, click Save. Note: You can delete a workstation from the exclusion list whenever you prefer.

Remote Install

This feature allows you to deploy the Quick Heal client on all supported Windows operating systems (OS).You can also install Quick Heal client on multiple endpoints at a time. Before proceeding with Remote Install, it is recommended that you go through the following requirements and changes:

Exception Rules:  On Windows Vista and later operating systems, Remote Installation is possible only with ‘Built-in Administrator’ account. To enable ‘Built-in Administrator’ account on endpoints running Windows Vista (or later), follow these steps: o Open Command Prompt in administrative mode. o Type ‘net user administrator /active: yes’ and press Enter. o Change the password of ‘Built-in Administrator’ from Control Panel > User Accounts.  For remote installation of Endpoint Security Client on Windows XP Professional Edition, follow these steps: o Open My Computer. o Go to Tools > Folder. o Click the View tab. o Clear the option Use simple file sharing. o Click Apply and then click OK.  Remote Installation of Quick Heal is not supported on Windows XP Home Edition. To install the Quick Heal client on Windows XP Home Edition, other methods of installation can be used, like Notify Install, Login Script, and Client Packager provided in Quick Heal Endpoint Security.  Remote Install is not supported with the users having blank passwords on Windows XP and later operating systems.  To install Quick Heal Client on systems which are under Domain Controller, specify the user name in 'DOMAINNAME\User Name' format where DOMAINNAME is the name of the Domain Controller and User Name is the name of the Domain Administrator. For Remote Install, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Deployment > Remote Install. The Remote Install page opens.

39 Client Deployment

2. You can initiate remote installation in any one of the following ways:  Remote Installation by Computers i. Under Network Places, select an endpoint, and then click Add. You can select multiple number of endpoints. You can also search an endpoint by the Find computer utility. Any endpoint in your network can be searched without enumerating the network. For adding an endpoint you are required to provide the user credentials of the target endpoint, having administrator rights. ii. On the Enter Network Password dialog, type the user credentials of the target endpoint and then click OK. Repeat these steps for all the endpoints that you have selected. . If the entered user credentials are correct, the target endpoints appear in the Endpoints selected to protect list. In case the user credentials to an endpoint are incorrect or you do not remember the user credentials to an endpoint, you can skip to the next endpoint and provide the user credentials to that endpoint by clicking the Skip button.  Remote Installation by IP Address i. Click the Add by IP Address button (you need not select any computer from the Network Places list) ii. On the Add Computer by IP Address dialog, select either of the following options: . Add by IP Address Range: If you select this option, you must provide a range of IP Addresses in the Start IP Address option and the End IP Address option. This is helpful if you want to install the Quick Heal client on a number of endpoints which are available in serial IP Address range at one go. . Add by IP Address: If you select this option, you need to provide the IP Address of the target endpoint. 3. Once you have entered the IP Address, click Next. For all the endpoints on which you want to install the client, you must provide the user credentials using the User Accounts option. 4. For User Accounts under Add Computer by IP Address, click Add. The Add User dialog appears. 5. On the Add User dialog, type the user credentials and then click OK. Repeat this for all the computers on which you want to install the client. 6. On the User Accounts list, click Finish. All the endpoints are added to the Endpoints selected to protect list. 7. Click Install. Upon completion of the installation of the Quick Heal client agent, the installation status appears in the Result field of the selected endpoints list.

40 Client Deployment

The Remote Install feature is available only in the clients with Windows operating systems.

Notify Install

This facility allows you to send email notification to the endpoints in the network to install the Quick Heal Endpoint Security client. The message can be typed and saved for future notifications. This can be edited whenever required. To notify clients to install the Quick Heal client, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Deployment > Notify Install. The Notify Install screen appears. 2. In the To field, type the email address. In case of multiple recipients insert a semi colon (;) between email addresses. Modify the subject line of the message if necessary. 3. Click Send Notification. The default email program on your system opens. Send the mail using the email program. Users have to click the link provided in the email that will redirect to the Quick Heal client installation Web page. The users need to install ActiveX and click Install to proceed with the Quick Heal client installation. After the Quick Heal client installation is finished, the Quick Heal AntiVirus installation will be initiated by the Quick Heal client.

The Notify Install feature is available only in the clients with Microsoft Windows and Mac operating systems.

Client Packager

Client Packager can compress the Quick Heal client setup and update files into a self-extracting file to simplify delivery through email, CD-ROM, or similar media. It also includes an email function that can open your default email client and allow you to send the package from the Client Packager tool. In Quick Heal Endpoint Security 6.0, Client packager can be created with or without the Quick Heal installer and also with MSI-based client packager. The Client agent installer including Quick Heal installer is helpful in situations where there are network bandwidth limitations to download the Quick Heal installer from the Endpoint Security server. In such cases, you can create the Client agent installer including the Quick Heal installer and burn into a CD/DVD or copy it to a USB removable disk for deployment on endpoints. When users receive the package, they just have to double-click the setup program to install. The Quick Heal clients installed through Client Packager communicates to the Quick Heal Endpoint Security server.

41 Client Deployment

To create a Windows Quick Heal Client package, follow these steps: 1. Go to Start > Programs > Quick Heal EPS Console 6.0 > Client Packager. 2. To create client packager installer, select any of the following options:  Create Client Agent installer including Quick Heal installer: Select this option to create the packager as an executable file. Quick Heal installer is integrated with this packager so it is useful in deploying the Quick Heal clients in low bandwidth workstations.  Create Client Agent installer without Quick Heal installer: Select this option to create the packager as an executable file. Quick Heal installer is not integrated with this packager so this package is smaller in size and is helpful in distributing through email attachments for installation.  Create MSI Client Agent installer: Select this option to create the packager as a Microsoft installer package. This package is useful in deploying the Quick Heal clients through the following:  Active Directory group policies  Microsoft SMS server 3. Select the setup type from the following:  32-bit for 32-bit client packager  64-bit for 64-bit client packager. 4. Under Select Group, click Browse to select a group from the EPS Console groups list. The selected group gets assigned to the client packager and the installed client through that client packager will move to the selected group of EPS Console. 5. Specify the folder path where you want to save Quick Heal Client Packager. 6. Click Create.

 To install Endpoint Security Client on 32-bit operating system, use 32-bit Client packager.  To install Endpoint Security Client on 64-bit operating system, use 64-bit Client packager.

To create a Mac Quick Heal Client package, follow these steps: Open Client Packager on QHEPS server following the listed path: 1. Go to Start > Programs > Quick Heal EPS Console 6.0 > Client Packager 2. To create client packager installer, Select Create Client Agent Installer for Mac option. Administrator needs to download the Mac Client build from the following URL:  http://dlupdate.quickheal.com/builds/eps6.0/EPSMACCL.DMG 3. After downloading, copy it to “Quick Heal\Endpoint Security 6.0\Admin\Web\build\acmac” 4. Create a package using Client Packager. The TAR file created after packaging will be saved at acmac folder.

42 Client Deployment

When the administrator downloads AGNSETP from the link provided in the e-mail for ‘Notify Install’, the setup will be downloaded from the ACMAC folder of EPS server.

Sending the package through email You need to have the default mail client installed to use the Client Packager email function. To send the package from the console, follow these steps: 1. Click Send mail. The default email client will open. The email with the default subject and message appears. However, you can make changes to the subject and message, if required. 2. In the To field, specify the recipients of this package. If required, you can also mark your email to other recipients in your organization in the Cc or Bcc recipients. 3. Click Send. Note: Send mail button will remain disable for Mac Client Packager and Client Agent installer including Quick Heal installer option.

Login Script

This section includes the following.

Installing Login Script This feature allows you to assign a login script to the users so that they can deploy Quick Heal Client on remote systems when they log on to the selected domain. You can assign a script called QHEPS.BAT to the selected users in the domain. This script will install Quick Heal Endpoint Protection on the system when the user logs on to the concerned domain.

The Login Script feature is available only in the clients with Windows operating systems.

Opening Login Script Setup To open the Login Script Setup, follow these steps: 1. Select Start > Programs > Quick Heal EPS Console 6.0. 2. Click Login Script Setup. 3. Type the Super Administrator Password of Quick Heal Endpoint Security and click OK. The Login Script Setup application opens. The left panel of the application includes a tree-like structure that displays all the domains in your network.

Assigning Login Script To assign Login Script, follow these steps: 1. Double-click the Domain.

43 Client Deployment

2. Click the Domain Name. 3. Type the User Name and Password of the user having administrative privileges of the selected domain. A list of all users of the selected domain is displayed in the right panel. i. Select a user or multiple users from the list to assign login script. ii. To select all users, click Check All. iii. To deselect all the selected users, click Uncheck All. 4. Select Overwrite existing Login Script if you want to overwrite the existing assigned login script of the selected users. 5. To assign login script to the selected users, click Apply. When a user logs on to the domain server, the assigned login script will deploy the Quick Heal client on the user system.  Users who do not have administrative privileges under the domain are shown in red color.  The Result for a user can either be Assigned or Not Assigned. If the Result of a user is Assigned, it indicates that a script is assigned to that user. If the Result of a user is Not Assigned, it indicates that no scripts are assigned to that user.  The Quick Heal client will get deployed only by the users having administrative privileges on Windows 2000 and later operating systems. 6. To exit the Login Script Setup application, click Close.

Installing Quick Heal Endpoint Security on Mac Operating Endpoints

Before continuing, create a Mac Client Packager (Refer this) After the Mac Client Packager has been created, the administrator can install EPS client using Notify Install method. Notify Install allows you to send e-mail notification to the endpoints in the network to install the Quick Heal Endpoint Security client. To notify clients to install the Quick Heal client, refer the Notify Install section. A Notify Install message containing a link for the installer file is sent from the administrator before installing Quick Heal Endpoint Security. To install Quick Heal Endpoint Security, follow these steps: 1. To install QHEPS Client on a Mac system, type the link in the browser (sent to you in the e- mail). A web page appears that displays the prerequisites for installation and includes a link to the installer file (Download Mac Client). Please read the prerequisites carefully. 2. Click through the Download Mac Client link. A tar file is downloaded that includes the installer. 3. Go to the location where you have saved the tar file and extract all its components.

44 Client Deployment

4. Double-click the installer file (EPSMACCL.DMG). Run the Installer to start the Quick Heal Endpoint Security installation. Quick Heal Endpoint Security is installed successfully.

Installation of Standalone Quick Heal Total Security for Mac build will proceed even if QHEPS client is installed.

Installing Quick Heal Endpoint Security Client on Linux- based Endpoints

Quick Heal clients need to be manually installed by the Administrator on Linux endpoints. To install the Quick Heal client on Linux endpoints, follow these steps: 1. Follow the steps according to your endpoint’s configuration:  For the 32-bit Linux Endpoint, download the ‘epslin32.tar.gz’ file from the following url: . http://dlupdate.quickheal.com/builds/eps6.0/epslin32.tar.gz And copy it to ‘Quick Heal\Endpoint Security 6.0\Admin\web\build\epslin32’ folder located in Quick Heal EPS server installation.  For the 64-bit Linux Endpoint, download the epslin64.tar.gz file from the following url: http://dlupdate.quickheal.com/builds/eps6.0/epslin64.tar.gz And copy it to ‘Quick Heal\Endpoint Security 6.0\Admin\web\build\epslin64’ folder located in Quick Heal EPS server installation folder. 2. Copy the epslin32 or epslin64 folder (according to the configuration) on your Linux Endpoint. 3. Open the terminal on your Linux endpoint and log in as a root user. 4. Trace the path where the epslin32 or epslin64 folder is saved. 5. Type the command ./install to execute the installation script of Quick Heal. The installation script will do the following:  It copies the necessary files to /usr/lib/Quick Heal folder.  It will install Quick Heal client successfully. 6. This completes the Quick Heal client installation.

 Online Protection is supported only on 32-bit Operating Systems.  Quick Heal GUI Scanner is available only on 32-bit endpoints, it will not be available for 64 bit endpoints. Quick Heal settings can be configured for 64 bit endpoint using command line interface.

After installation:

45 Client Deployment

 If Online Protection is not installed by ./install script, you can install online protection by running ./install script with --online parameter. If automatic installation of Dazuko fails, it prompts for the dazuko file. Quick Heal Online Protection (qhdaemon) requires Dazuko, a free software project providing access control. In order to use qhdaemon, you will need to compile Dazuko as kernel module or compile into the kernel. Visit http://dazuko.org for more details.  Configure Quick Heal Online Protection. You can configure Quick Heal Online Protection later by running "configqhonline" from /usr/lib/QuickHeal/QuickHeal.

Disk Imaging

You can deploy Endpoint Security client also through disk imaging like Sysprep. To deploy clients through Disk Imaging, follow these steps: 1. Disconnect the computer that will be used as a source for disk imaging from the network, or ensure that this computer is not able to communicate to the Endpoint Security server. 2. Install operating system and other applications. 3. Install Client. To install Client, follow these steps: i. Create a Client Packager without AV Build ii. Create a Client Packager with AV Build 4. Create a disk image. Note: All the Endpoint Security clients have GUID (Globally Unique Identifier). If the Endpoint Security client (after installation on the endpoint that is the source for disk imaging) communicates with the Endpoint Security server, the server will automatically assign GUID to this client. If such a client is Disk Imaged, then the Endpoint Security server will not able to uniquely identify the clients after deployment of the image on multiple endpoints. To avoid this, ensure that the Endpoint Security client does not communicate with the Endpoint Security server when it gets installed on the computer that is the source for disk imaging.

The Disk Imaging feature is available only in the clients with Windows operating systems.

Firewall Exception Rules

Operating systems such as Windows and Linux have their own Firewall bundled with them. If the user prefers to retain the firewall bundled with the Operating System, then exceptions can be created with Endpoint security for such systems. These exception rules are created during installation of Quick Heal Endpoint Security. For the system on which Quick Heal Endpoint Security is installed, the exceptions will be automatically created during installation. For the Quick Heal client the exception will automatically be created during deployment of Quick Heal clients. The system with Quick Heal Endpoint Security will require three exception rules: one for the server, one for its own client, and one for the Endpoint Security site configured on it.

46 Client Deployment

The following are the exception rules for server:  Agent Server 6.0  Client Agent 6.0  Endpoint Security Site Port 6.0 The system with the Quick Heal client will require one exception rule to be created. The following is the exception rule for clients:  Client Agent 6.0 If the client system is a Linux-based system, the exception rule will be created in its Firewall as a port number.

Remote Uninstall

With Remote Uninstall, you can remove the Quick Heal client along with AntiVirus program from the computers on your network remotely.

The Remote Uninstall feature is available in the clients with Microsoft Windows, Mac, and Linux operating systems. To remove the client through Remote Uninstall, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Client Deployment > Remote Uninstall. The Remote Uninstall dialog appears that displays all the groups. Each group includes the name of endpoints belonging to the group. 2. Select the endpoint from which you want to uninstall the Quick Heal client. To uninstall Quick Heal Client from all endpoints, click the checkboxes available to the endpoint name columns. You can also schedule uninstallation from endpoints that are not online or not present in the network by selecting Show offline clients.Select the Show Endpoints within subgroup to display the name of endpoints that are in the subgroup from the list of endpoints without actually exploring the network. 3. Select Start Uninstall Notification. The uninstallation starts.

Stop Uninstallation Notifications If you want to send notifications to stop uninstallation to the endpoints that have not yet started uninstallation, follow these steps: 1. Select the endpoints from which you want the clients should not be removed. 2. Click Stop Uninstall Notification. 3. Clients that have not yet started the client uninstallation will skip the uninstallation request. However, clients that are already running the uninstallation program cannot stop the uninstallation procedure.

47 Client Deployment

Terms Definition

Show offline clients Helps you view the endpoints that are not online or are disconnected from the network. Show endpoints within Helps display the endpoints that are in a subgroup. subgroup Notification for Remote Uninstall from QHEPS web console will not be sent if the user is not logged on to the Mac system.

48

Chapter 7. Manage Groups

This feature helps you create groups and subgroups, and apply a policy to a group (or a subgroup). A group includes a number of endpoints and all the endpoints within a group share the same policy. You can delete or rename a group or set different policies for different group. You can also move endpoints from one group to another. You can export or import groups from one EPS server to another along with policies assigned to them.

Adding a Group

To add a new group, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Select the root node, for example Endpoint Security, and then right-click it. A submenu appears with the options such as Add Group, Delete Group, Rename Group, Import from Active Directory, and Set Policy. However, only Add Group is enabled. 3. Select Add Group. The Add Group screen appears. 4. In the Enter Group Name text box, type a group name. 5. Click OK. The new group is added.

Terms Definition

Show endpoints within Helps you display the endpoints that are in a subgroup. subgroup Search Helps you search an endpoint by its name or IP Address. CSV Helps you save the report in CSV format.

No subgroup can be created under the Default group.

Adding a Subgroup

To add a subgroup, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Under EPS Console, select a group and then right-click it.

49 Manage Groups

A submenu appears with the options such as Add Group, Delete Group, Rename Group, Import from Active Directory, and Set Policy. 3. Select Add Group. The Add Group screen appears. 4. In the Enter Group Name text box, type a group name. 5. Click OK. The subgroup is added.

Deleting a Group

To delete a group, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Under EPS Console, select a group and then right-click it. A submenu appears with the options such as Add Group, Delete Group, Rename Group, Import from Active Directory, and Set Policy. 3. Select Delete Group. A confirmation message is displayed. 4. Click OK. The selected group is deleted. Note: If you delete a group that includes subgroups, then all the subgroups are also deleted.

Renaming a Group

To rename a group, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Under EPS Console, select a group and then right-click it. A submenu appears with the options such as Add Group, Delete Group, Rename Group, Import from Active Directory, and Set Policy. 3. Select Rename Group. The Rename Group screen appears. The old group name is also displayed. 4. In the Enter New Name text box, type a new group name. 5. Click OK. The group name is modified. However, the policy applied earlier to this group does not change. To change a policy, you have to apply a new policy.

50 Manage Groups

Importing from Active Directory

This feature allows you to import Active Directory Structure in the console. This is helpful when you need to have group structure in the console that is already available in the Active Directory. Note:  To import from Active Directory, your Console must be installed on the domain machine or it should be a member of the domain.  “Import From Active Directory” cannot be done with the default group. To import Active Directory Structure, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and select Clients > Manage Groups. 2. Under EPS Console, right-click a group. Add Group, Delete Group, Rename Group, Import from Active Directory, and Set Policy options are displayed. 3. Select the Import from Active Directory option. The Active Domain Controller dialog appears. 4. Select a domain and then click Next. The authentication screen appears. 5. Type the user name in the format "domain name\user name" and then enter your password. Click Next. 6. On the Select Active Directory Container screen, select a Domain Name or Active Directory Container to import. 7. If you select a Domain Name, the whole Active Directory will get imported and if you select any Active Directory Container, only the selected container will get imported. 8. Click the Finish button.

Setting Policy to a Group

Policies may include different client settings for different groups in an organization. To set a policy to a group, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Under EPS Console, select a group and then right-click it. A submenu appears with the options such as Add Group, Delete Group, Rename Group, and Import from Active Directory, and Set Policy. 3. Click the Set Policy option. A list of policies appears.

51 Manage Groups

4. Select the policy that you want to apply. The policy is applied. The applied policy is displayed in the right panel along with the endpoint name, group, and other details.

Changing Group of an Endpoint

This is helpful if you think an endpoint should be in a certain group or the group has to be changed because of policy change at your organization. In case a change is incorporated, the protection policy of the new group will apply. To change group of an endpoint, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Groups. 2. Under EPS Console, select a group. A list of all endpoints of the selected group is displayed in the right panel. 3. Select an endpoint and drag it to a different group where you want. The endpoint is included in the new group.

Exporting groups and policies

This feature allows you to export groups and policies assigned to them from one EPS server to another. This is helpful when you need to move groups from one EPS server to another or in case of reinstallation. The data is downloaded to a .db file. You must copy that file to another server and use the import option to import groups and policies assigned to them. To export groups and policies assigned to them, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and select Clients > Manage Groups. 2. Click Export. A message is displayed as follows” Do you want to save or open this file 3. Click Save. The file containing groups and policies assigned to them is saved.

Importing groups and policies

This feature allows you to import entire groups and policies assigned to them from one EPS server to another. The groups data is downloaded to a .db file when you export the groups. You must copy that file to another server and use the import option for groups.

52 Manage Groups

To import groups, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and select Clients > Manage Groups. 2. Click Import. The wizard to select file appears 3. Select file which is exported previously The groups and policies assigned to them are imported and a message is displayed as follows  "File imported successfully". Note: Policies which are not assigned to any group are not exported or imported from Manage Groups page. Those policies can be exported or imported by using Export or Import option on Clients > Manage Policies page.

53

Chapter 8. Manage Policies

Each organization prefers to enforce a policy that regulates its users. Quick Heal Endpoint Security allows the administrators to create policies that help centrally control and manage the users belonging to a group. You can create a policy about permission to visit only certain Websites, scan their systems regularly and implement policy for email communication. You can also restrict usage of certain applications and USB-based devices. The Manage Policies feature gives you the flexibility and control over creating new policies and modifying or removing an existing policy. Different protection policies can be created for different groups for better control. Policies may include different client settings and scan schedules. Once a policy is created, it can be easily applied to a group. The users under a group or a subgroup will inherit the same policy. A group is nothing but a department in an organization. You should create groups before you create a policy setting. To learn about how to create a group, see Adding a Group.

Understanding Security Policy Scenario

The following example illustrates how different security policies can be created within an organization for different departments. Two departments namely Marketing and Accounts have been taken as an example.

Policy Settings for Marketing and Account Departments Compared

Client Settings Policy Features Marketing Dept. Accounts Dept. Scan Settings Scan mode Automatic Advanced Virus Protection Setting Enabled Enabled Block suspicious packed Enabled Enabled files Automatic Rogueware scan Enabled Enabled Disconnect Infected Not Enabled Enabled Endpoints from the network Email Settings Email Protection Enabled Enabled Trusted Email Clients Enabled Enabled Protection Spam Protection Level Soft Strict External Drives Scan External Drives Enabled Enabled Settings Autorun Protection Enabled Enabled Mobile Scan Not Enabled Enabled IDS/IPS IDS/IPS Enabled Enabled

54 Manage Policies

Disconnect system from the Not Enabled Enabled network (only in case of DDOS and Port Scanning attack) Firewall Firewall Enabled Enabled Level Low High Web Security Browsing Protection Enabled Enabled Phishing Protection Enabled Enabled Web Categories Business Allowed Denied Social Networking Denied Denied Application Control CD/DVD Applications Authorized Unauthorized Games Unauthorized Unauthorized Advanced Device Enable Advanced Device Enabled Enabled Control Control Device Types No devices Devices selected enabled and enabled Exceptions Not enabled Enabled and appropriately added Data Loss Prevention Enable Data Loss Enabled Enabled Prevention Select Data Transfer Monitor Monitor Transfer Channels Network Share, through Application, Monitor Monitor Removable Clipboard, devices Disable Print screen Select Data to be monitored File Types, File Types, Confidential Confidential Data Data, User Defined Dictionaries Actions Block and Report only Report File Activity Monitor Enable File Activity Monitor Enabled Enabled Removable Drives Enabled Enabled Network Drives Enabled Enabled Local Drives Not Enabled Enabled Update Setting Automatic update Enabled Enabled Download from Internet Enabled Not Enabled Download from Endpoint Not Enabled Enabled Security Server Internet Settings Proxy Settings Enabled Not Enabled General Settings Authorize access to the Enabled Enabled client settings

55 Manage Policies

Creating Polices

You can create different policies with different client settings and scan schedules to apply to different groups. This can help you manage the groups and users in a better way.

Creating a new policy To create a new policy, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Policies. 2. To create a new policy, click Add. The new policy settings screen appears. 3. In the Policy Name text box, type the policy name. After naming the new policy, you need to configure the client settings and schedule settings. 4. To save your settings, click Save Policy.

While creating a new policy, you can allow the clients to configure their own settings by selecting the Let clients configure their own settings option. Note: If you enable this option, the Advanced Device Control and Data Loss Prevention features are disabled.

Renaming a policy To rename a policy, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Policies. 2. Click the policy that you want to rename. The selected policy appears with its settings 3. In the Policy Name text box, rename the policy. You can change the policy settings also. 4. To save your setting, click Save Policy.

Deleting a policy To delete a policy, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Policies. 2. Select the policy that you want to delete, and then click Delete. A confirmation message appears. 3. If you are sure to delete the selected policy, click YES.

56 Manage Policies

If the selected policy is applied to a group, it cannot be deleted and a message about Failed to delete policies appears. If a policy is applied to group and you want to delete it, apply a different policy to that group so the target policy is not applied to any group and then delete such a policy successfully.

Importing and Exporting Policies This feature allows you to import or export the policies of Quick Heal Endpoint Security. If you need re-installation or have multiple endpoints and want the same settings, you can simply export the settings configured on your current endpoint and easily import them on the endpoint(s). Both the default settings and the settings made by you can be exported. Tip: The settings must be exported before you uninstall Quick Heal Endpoint Security. Importing or exporting the settings can be done in the same way.

Exporting a policy To export the policy settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Policies. 2. Select a policy that you want to export and then click the Export button. 3. Select the drive and folder in which you want to store the policy. 4. Click Save. The policy settings file is exported to the selected location.

Importing a policy To import the policy settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Clients > Manage Policies. 2. Click the Import button. 3. Select the Import Settings file from the location where it exists. A new message appears that allows you to select which policies you want to import. 4. Select the policies that you want to import and then click Import.

57

Chapter 9. Assets

Quick Heal EPS 6.0 has a new feature whereby you can keep a watch on the System information, hardware information, software installed and Updates that have been carried out on your systems. You can also view the hardware changes if any that are made to the configuration of the systems in your network. You can also keep a tab on the list of the endpoints where the changes have actually been carried out and export the above information to a .csv file.

Viewing the details for Endpoints

To view details follow the given steps: 1. Log on to the Quick Heal Endpoint Security web console. 2. Click Clients > Assets. The Assets view displays with the details of assets such as Endpoint name, group, domain, IP address, Operating system, and manufacturer name. To lookup the details for a particular Endpoint, enter the Endpoint name in the search textbox and click the search icon. 3. Select an Endpoint from the displayed list and click on View Details to obtain more details regarding the changes to the asset in terms of system, hardware, software and Updates installed.

Enabling Asset Management You can enable the Asset Management reporting by the following procedure. 1. Log on to the Quick Heal Endpoint Security web console. 2. Click Admin Settings > Clients. 3. Click Asset Management. 4. Enable Asset Management. 5. Click Apply.

 The Asset Management feature is available only for clients with Windows operating systems.  The details of some software(s) may not be displayed in Assets.

58

Chapter 10. Settings

This feature allows the administrators to see and customize the settings of the default policy. The default policy is available as soon as you install the product on your system. The default policy includes both the client settings and schedule scan settings and is optimal for security that you can apply to a group. However, you can customize the settings according to the requirement but its name cannot be changed. The default policy is also available in the Manage Policies option (Quick Heal Endpoint Security > Clients > Manage Polices) from where you can customize its settings. Importantly, if you have customized the settings and later you want to revert to the default settings, you can do so by clicking the Default button.

Client Settings

This section includes the following.

Scan Settings This feature allows you to define a policy on how to initiate the scan of the client systems in your organization. The policy can be refined to enable Virus Protection or DNA scanning or include blocking of any suspicious packed files, and other settings. The following table shows a comparison of the features in Scan Settings that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Automatic scan mode X Scan executable files X Scan all files (Takes longer time) X Scan packed files X X Scan mailboxes X X Scan archives files X To create a policy for Scan Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then select Settings. 2. On the Settings screen, click Scan Settings. 3. Under Scanner Settings, select the scan mode. The Scan Mode includes Automatic and Advanced.

59 Settings

You can enable Virus Protection, Advanced DNAScan, Block Suspicious files, Automatic Rogueware Scan, Disconnect Infected Endpoints from the network, Exclude files and folders, and exclude extensions from being scanned. 4. To save your setting, click Save Policy.

Scanner Settings Under Scanner Settings, you can select either of the following scanning options:  Automatic*: This is the default scan setting that ensures optimum protection to the clients.  Advanced: If you select this option, you may further need to customize the configuration of scanning options as per your requirement. When you select this option, other features are activated that are described as follows:

Features Description

Select items to scan Select either of the options to scan: Scan executable files: Includes scanning of executable files only. Scan all files: Includes scanning of all files but takes longer time for scanning. Scan Packed Files* Scans packed files inside an executable file. Scan Mailboxes* Scans emails inside the mailbox files. Scan Archive Files* Scans compressed files such as ZIP and ARJ files including other files. Archive Scan Level You can set the level for scanning in an archive file. The default scan level is set to 2. You can increase the default scan level however that may affect the scanning speed. Select action to be performed You can select an action that you want to take when a when virus found in archive file virus is found in archive file during an on-demand scan. You can select any one of the following actions:  Delete – Deletes the entire archive file even if a single file within the archive is infected.  Quarantine – Quarantines the archive containing the infected file(s).  Skip – Takes no action even if a virus is found in an archive file. Select action to be performed You can select an action that you want to take when a when a virus is found virus is found during manual scan. You can select any one of the following actions:  Repair – All the infected files are repaired automatically. The files that are not repairable are deleted.  Delete – All the infected files are deleted automatically.  Skip – Takes no action even if a virus is found in a file.

60 Settings

To know for which clients the asterisked features are applicable, see the comparison table.

Virus Protection Settings This feature helps you continuously monitor the client systems against viruses that may infiltrate from sources such as email attachments, Internet downloads, file transfer, and file execution. It is recommended that you always keep Virus Protection enabled to keep the client systems clean and secure from any potential threats. The following table shows a comparison of the features in Virus Protection Settings that are applicable for different flavors of Quick Heal Endpoint Security clients:

Clients Features Windows Mac Linux

Load Virus Protection at Startup Display alert messages X Report source of infection X X Select action to be performed X when a virus is found With Virus Protection, you can configure the following:

Features Description

Load Virus protection at Startup Enables real-time protection to load every time the system is started. Display Alert messages Displays an alert message with virus name and file name, whenever any infected file is detected by the virus protection. Report source of infection Displays the source IP address of the system where the virus is detected. Select the action to be You can select an action that you want to take when a performed when a virus is found virus is found during manual scan. You can select any one of the following actions: Repair – All the infected files are repaired automatically. The files that are not repairable are deleted. Delete – All the infected files are deleted automatically. Deny Access – Access to an infected file is blocked.

Advanced DNAScan Settings Helps you safeguard the client systems even against new and unknown malicious threats whose signatures are not present in the virus definition database. DNAScan is an indigenous technology of Quick Heal to detect and eliminate new types of malware in the system. DNAScan technology successfully traps suspected files with very less false alarms.

61 Settings

Advanced DNAScan Settings also includes the following:

Features Description

Enable DNAScan Helps in scanning the systems based on Digital Network Architecture (DNA) pattern. Enable Behavior detection Helps in scanning the files and systems based on their system behavior. If the files or systems behave suspiciously or their behavior changes by itself is considered as suspicious. This detection can be categorized based on their criticality level as Low, Moderate, and High. You can select the detection criticality level depending on how often suspicious files are reported in your systems. Submit suspicious files Helps in submitting suspicious files to the Quick Heal research lab automatically for further analysis. Show notification while Displays a notification while submitting DNA suspicious submitting files files.

 The Advanced DNAScan Settings feature is available only in the clients with Windows operating systems.  The ‘Behavior detection system’ scan setting is not applicable for Windows XP 64-bit and Windows Server platforms.

Block suspicious packed files This feature helps you identify and block access to the suspicious packed files. Suspicious packed files are malicious programs that are compressed or packed and encrypted using a variety of methods. These files when unpacked can cause serious harm to the endpoint systems. It is recommended that you always keep this option enabled to ensure that the clients do not access any suspicious files and thus prevent the spread of infection.

The Block suspicious packed files feature is available only in the clients with Windows operating systems.

Automatic Rogueware Scan Settings This feature automatically scans and removes rogueware and fake anti-virus software. If this feature is enabled, all the files are scanned for possible rogueware present in a file.

The Automatic Rogueware Scan feature is available only in the clients with Windows operating systems.

Disconnect Infected Endpoints from the network This disconnects the infected endpoint(s) from the network. The following options are available:  When non-repairable virus found: Disconnects the endpoint, if a non-repairable virus is found running in the memory.  When suspicious file found by DNAScan: Disconnects the endpoint, if any suspicious file is found running in the memory.

62 Settings

The Disconnect Infected Endpoint is from the network feature is available only in the clients with Windows operating systems.

Exclude Files and Folders This feature helps you decide which files and folders should be omitted from scanning for known viruses, Advanced DNAScan, and Suspicious Packed files. It is helpful in case you trust certain files and folders and want to exclude them from scanning. The following table shows a comparison of the features in Exclude Files and Folders that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Exclude from: Known Virus X Detection

Exclude from: DNAScan X X Exclude from: Suspicious X X Packed Files Scan Exclude from: Behavior X X Detection To add a file or a folder, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab. 2. On the Settings screen, click Scan Settings. 3. Under Exclude File and Folders, click Add. 4. On the Exclude Item screen, select either of the following:  Exclude Folder: If you select Exclude Folder, type the folder path in Enter folder path. If you want a subfolder also to be excluded from scanning, select Include Subfolder.  Exclude File: If you select Exclude File, type the file path in Enter file path. 5. Under Exclude from, select any of the following as per your requirement:  Known Virus Detection  DNAScan  Suspicious Packed Files Scan  Behavior Detection 6. To save your settings, click OK. Important:  If you select Known Virus Detection, DNAScan and Suspicious Packed File Scan will also be enforced and all the three options will be selected.

63 Settings

 If you select DNAScan, Suspicious Packed File Scan will also be enforced and both the options will be selected.  However, you can select Suspicious Packed File Scan or Behavior Detection as a single option.

Exclude Extensions This feature helps you exclude the files from scanning by real-time virus protection by their extensions. This is helpful in troubleshooting performance related issues by excluding certain categories of files that may be causing the issue. To exclude a file extension from scanning, follow these steps:  Under Exclude Extensions, type an extension in the file extension name text box, and then click Add. The file extension should in the format: xml, html, zip etc. without any dots. The Exclude Extensions feature is available only in the clients with Windows and Mac operating systems.

Email Settings This feature allows you to customize the protection rules for receiving emails from various sources. You can set rules for blocking spam, phishing and virus infected emails. The following table shows a comparison of the features in Email Settings that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Enable Email Protection X Enable Trusted Email Clients X X Protection To configure Email Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab. 2. On the Settings screen, click Email Settings. 3. Select the options that you want to enable. The Email Setting options include: Email Protection, Trusted Email Clients Protection, Spam Protection, Spam Protection Level, white list, and black list. 4. To save your settings, click Save Policy.

Email Protection With this feature, you can apply the protection rules to all incoming emails. These rules include blocking infected attachments (malware, spam and viruses) in the emails.

64 Settings

To apply email protection to the users in a group, select Enable Email Protection. Once the feature is enabled, all incoming emails will be scanned before they are sent to Inbox.

The Email Protection feature is available only in the clients with Microsoft Windows and Mac operating systems.

Trusted Email Clients Protection Since email happens to be the most widely used medium of communication, it is used as a convenient mode to deliver malware and other threats. Virus authors always look for new methods to automatically execute their viral codes using the vulnerabilities of popular email clients. Worms also use their own SMTP engine routine to spread their infection. Trusted Email Clients Protection is an advanced option that authenticates email-sending application on the system before it sends emails. This option prevents new ‘worms’ from spreading further. It includes a default email client list that is allowed to send emails. Email clients in the default list include Microsoft Outlook Express, Microsoft Outlook, Eudora, and Netscape Navigator. Trusted Email Clients Protection supports most of the commonly used email clients such as Microsoft Outlook Express, Microsoft Outlook, Eudora and Netscape Navigator. If your email client is different from the ones mentioned, you can add such email clients in the trusted email client list.

The Trusted Email Clients Protection feature is available only in the clients with Windows operating systems.

Spam Protection This feature allows you to differentiate genuine emails and filter out unwanted email such as spam, phishing, and adult emails. We recommend you to always keep Spam Protection enabled. If you enable Spam Protection, the Spam Protection Level, White list, and Black list options are also activated. The following table shows a comparison of the features in Spam Protection that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Spam Protection X Spam Protection Level X X Enable White list X Enable Black list X

Configuring Spam Protection To configure Spam Protection, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab.

65 Settings

2. On the Settings screen, go to Client Settings > Email Settings. 3. Select Enable Spam Protection. 4. Under Spam protection level, set the protection level from the following:  Soft: Applies soft filtering spam protection policy.  Moderate: Ensures optimum filtering. It is recommended to have moderate filtering enabled. However, this is selected by default also.  Strict: Enforces strict filtering criteria. However, it is not ideal as it may block even genuine emails. Select strict filtering only if you receive too many junk emails 5. Select Enable white list to implement protection rules for whitelisted emails. 6. Select Enable email black list to implement the protection rules for blacklisted emails. 7. To save your settings, click Save Policy.

To know for which clients the asterisked features are applicable, see the comparison table.

Setting spam protection rule for Whitelist Whitelist is the list of trusted email addresses. Content from the whitelisted email IDs is allowed to skip the spam protection filtering policy and is not tagged as SPAM. This is helpful if you find that some genuine email IDs get detected as SPAM. Or if you have blacklisted a domain but want to receive emails from certain email addresses from that domain. To add email addresses in the whitelist, follow these steps: 1. Select Enable White List. Check whether Spam Protection is enabled. If Spam Protection is enabled only then the whitelist option is activated. 2. In the Email ID text box, type an email address or a domain and then click Add. You can import email addresses or domains from text file using the Import button. Note:  An emails address should be in the format: [email protected].  A domain name should be in the format: *@mytest.com. The same email ID cannot be entered in both blacklist and whitelist.

Setting spam protection rule for Blacklist Blacklist is the list of email addresses from which all emails are filtered irrespective of their content. All the emails from the addresses listed here are tagged as "[SPAM] -". This feature is useful particularly if your server uses an open mail relay, which is used to send and receive emails from unknown senders. This mailer system can be misused by spammers. With blacklist, you can filter incoming emails that you do not want or are from unknown senders both by email IDs and domains.

66 Settings

To add email addresses in the blacklist, follow these steps: 1. Select Enable black List. Check whether Spam Protection is enabled. If Spam Protection is enabled only then the blacklist option is activated. 2. In the Email ID text box, type an email address or a domain and then click Add. You can import email addresses or domains from text file using the Import button. Note:  An emails address should be in the format: [email protected].  A domain name should be in the format: *@mytest.com. The same email ID cannot be entered in both blacklist and whitelist.

External Drives Settings Whenever your system comes in contact with any external devices, your system is at risk that viruses and malwares may infiltrate through them. This feature allows you to set protection rules for external devices such as CDs, DVDs, and USB-based drives. The following table shows a comparison of the features in External Drives Settings that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Scan External Drives X X Autorun Protection Settings X X Mobile Scan Settings X X To configure External Drives Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click External Drives Settings. 3. Select the options that you want to enable. The External Drives Settings options include: External Drives Settings, Autorun Protection Settings, and Mobile Scan Settings. 4. To save your setting, click Save Policy. External Drives Settings includes the following:

External Drives Settings With External Drives Settings, you can scan the USB-based drives as soon as they are attached to your system. The USB-based drives should always be scanned for viruses before accessing it from your system, as these devices are convenient mediums for transfer of viruses and malwares from one system to another.

67 Settings

Autorun Protection Settings Autorun Protection protects your system from autorun malware that tries to sneak into the system from USB-based devices or CDs/DVDs using the autorun feature of the installed operating system.

Mobile Scan Settings This feature scans for viruses, spywares and other malwares in mobile devices. To scan your mobile device you need to connect it to PC using any of the following methods:  USB Cable  Bluetooth Note: The Mobile Scan feature is not supported on server operating systems.

IDS/IPS When you create a network where numerous machines are deployed, security is of paramount concern. With IDS/IPS, you can detect attacks from various sources such as IDS/IPS, Port scanning attack, Distributed Denial of Service (DDOS) and so on. This detection implements a security layer to all communications and cordons your systems from unwanted intrusions or attack. You can also take actions like blocking the attackers for certain time, disconnecting the infected system from the network, and also send an alert message to the administrator.

The IDS/IPS feature is available only in the clients with Microsoft Windows. You can create different policies with varying IDS/IPS settings and apply them to the groups so that each has separate policies based on the requirement. 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click IDS/IPS. 3. Enable any of the following:  Enable IDS/IPS  Detect Port Scanning Attack  Detect DDOS(Distributed Denial of Service) Attack 4. From the following, select an action to be performed when attack is detected:  Block Attackers IP for … Minutes.  Enter time here.  Disconnect endpoint from the network (only in case of DDOS and Port Scanning attack).  Display alert message when attack is detected.  This helps you take an appropriate action when attack is detected. 5. To save your settings, click Save Policy.

68 Settings

Customization for Port Scanning Further customization settings for Detect Port Scanning Attack and Detect DDOS (Distributed Denial of Service) Attack are as follows: 1. On the IDS/IPS screen, click Customize available next to Detect Port Scanning Attack or Detect DDOS (Distributed Denial of Service) Attack. A dialog for further settings appears 2. Select one of the levels from:  Soft: Detects attack if many ports are scanned.  Normal: Detects attack if multiple ports are scanned.  Strict: Detects attack even if a single port is scanned.  Custom: Helps you customize the attack condition and number of scanned ports exceeds than field. 3. To exclude an IP address that you do not want to be scanned, click Add under Excluded IP Addresses. 4. On the Add IP Address screen, type an IP Address or IP range and then click OK. 5. To exclude Port that you do not want to be scanned, click Add available under Excluded Ports. 6. On the Add Port screen, type a Port or Port range and then click OK.

Customization for Distributed Denial of Service Further customization settings for Distributed Denial of Service Attack are as follows: 1. On the IDS/IPS screen, click Customize available next to Detect DDOS (Distributed Denial of Service) Attack. A dialog for further settings appears 2. Select one of the levels from:  Soft: Detects if many attacks occur.  Normal: Detects if multiple attacks occur.  Strict: Detects attack even if a single attack occurs.  Custom: Helps you customize the attack condition and number of attack sources exceeds than the specified limits. 3. To exclude an IP address that you do not want to be scanned, click Add under Excluded IP Addresses. 4. On the Add IP Address screen, type an IP Address or IP range and then click OK. 5. To exclude Port that you do not want to be scanned, click Add option available under Excluded Ports. 6. On the Add Port screen, type a Port or Port range and then click OK.

69 Settings

Firewall Firewall shields your system by monitoring both inbound and outbound network traffic. It analyzes all incoming traffic whether it is secure and should be allowed through, and checks whether the outgoing communication follows the compliance that you have set for security policies. Firewall works silently in the background and monitors network activity for malicious behavior. You can create different policies for various groups/departments like enabling Firewall protection, applying Firewall security level with an exception rule and other settings according to the requirements. For example, you can apply security level as High for the Accounts Department, and apply an exception rule by entering the policy with additional policy settings. You can also apply the Display alert message when firewall violation occurs and Enable firewall reports options. While for Marketing Department, you can create a policy with security level as Low without an exception rule and apply the Enable firewall reports options only.

The Firewall feature is available only in the clients with Microsoft Windows. To configure a policy for Firewall setting, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Firewall. 3. To enable Firewall, select Enable Firewall. 4. In the Level option, select one of the following:  Block all  High  Medium  Low 5. If you want an alert message about firewall violation, select Display alert message when firewall violation occurs. 6. If you want reports for all blocked connections, select Enable firewall reports. 7. To save your settings, click Save Policy. Note: If the Firewall policy is set as 'Block All' or 'High', Firewall will block all connections and generate many reports that may impact your network traffic.

Exceptions

Security Level Description

Block all Blocks all Inbound and Outbound traffic without any exception. This is the strictest level of security. High Blocks all Inbound and Outbound traffic with an exception rule. The exception policy can be created for allowing or denying traffic either for inbound or outbound through certain communication Protocols, IP address, Ports such as TCP, UDP, ICMP.

70 Settings

Medium Blocks all Inbound and allows all Outbound traffic with an exception rule. The exception policy can be created for allowing or denying traffic either for inbound or outbound through certain communication Protocols, IP address, Ports such as TCP, UDP, and ICMP. For example, if you allow receiving data from a certain IP address, the users can receive data but cannot send to the same IP address. To take more advantage of this security level policy, it is advisable that you allow receiving inbound traffic and block outbound traffic. Low Allows all Inbound and Outbound traffic. When you apply Low security level, it is advisable that you create an exception rule for denying particular inbound or outbound data with the help of certain Protocols, IP address, and Ports to take more advantage of the security level policy.

Exceptions With exceptions, you can allow genuine programs to perform communication irrespective of Firewall level set as High or Medium. You can add exception to allow inbound and outbound communication through IP Addresses and Ports. With Exceptions, you can block or allow Inbound and Outbound communication, through IP Addresses and Ports. To configure a policy with the Exceptions rule, follow these steps: 1. Under Exceptions, click Add. 2. On the Add/Edit Exception screen, type a name in the Exception Name text box and select a protocol. Click Next. The protocol includes: TCP, UDP, and ICMP. 3. Select a direction for traffic and then click Next. Traffic direction includes: Inbound and Outbound. If you select Outbound, the setting applies only to the Outbound traffic. If you select both Inbound and Outbound, the setting applies to both types of traffic. 4. Under IP Address, type an IP address or IP range and then click Next. If you select Any IP Addresses, you need not type an IP address as all IP addresses will be blocked. 5. Under TCP/UDP Ports, type a port or port range and then click Next. If you select All Ports, you need not type a port as all ports are selected. 6. Under Action, select either Allow or Deny. Click Finish.

Web Security This feature helps you create security policies for a department or group where Browsing and Phishing Protection can be enabled. This blocks malicious and phishing websites. You can also restrict or allow access to the websites as per your requirement. The following table shows a comparison of the features in Web Security that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

71 Settings

Clients Features Windows Mac Linux

Browsing Protection X Phishing Protection X Restrict access to particular categories of Websites (Web X Categories)

Block specified websites X To create a policy for Web Security, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Web Security. 3. Under Web Security, select either of the following or both:  Browsing Protection  Phishing Protection 4. Select Display alert message when website is blocked if you want to get an alert message when a blocked website is accessed by a user. 5. Under Web Categories, restrict or allow access to the Websites based on their categories as per the security policy of your organization. If you block a category, all the Websites under it will be blocked. 6. Under Block specified websites, enter the websites that you want to block. This is helpful if you are sure to block certain Websites. 7. Select Enable Web Security reports if you want to generate reports for all blocked websites. If you select this option, a large number of reports will be generated depending upon the web usage. 8. To save your settings, click Save Policy.

The features such as Display alert message when website is blocked and Enable Web Security reports are available only in the clients with Windows operating systems.

Browsing Protection Settings While users visit malicious websites some files may get installed on their systems. These files can spread malware, slow down the system, or corrupt other files. These attacks can cause substantial harm to the system. Browsing Protection ensures that malicious websites are blocked while the users in a group are accessing the Internet. Once the feature is enabled, any site that is accessed is scanned and blocked if found to be malicious.

72 Settings

Phishing Protection Settings Phishing is a fraudulent attempt, usually made through email, to steal your personal information. These emails usually appear to have been sent from seemingly well-known organizations and sites such as banks, companies and services seeking for your personal information such as credit card number, social security number, account number or password. Administrators can enable Phishing Protection that prevents users from accessing phishing and fraudulent websites. As soon as a site is accessed, it is scanned for any phishing behavior. If found so, then it is blocked to prevent any phishing attempts.

Exclusion for Browsing Protection and Phishing Protection Exclusion enables you to apply an exception rule to the protection policy for Browsing Protection and Phishing Protection. This helps you exclude the URLs of the sites that are actually genuine but get erroneously detected either as malicious or phishing sites. You are recommended to exclude only those URLs that you trust to be safe and genuine. You can exclude the URLs in the following way: 1. On the Web Security screen, click the Exclusion button. The Exclude URLs dialog appears 2. In the Enter URL text box, type the URL and then click Add. The Report Miscategorized URL dialog appears. You can report about miscategorization of the URL to the Quick Heal lab if it gets detected either as malicious or a phishing site. 3. Select one of the reasons from the following:  URL is getting detected as Malicious.  URL is getting detected as Phish. 4. To report about miscategorization, click Yes. If you do not want to report about miscategorization, click No. The URL is added in the Exclude URL list. 5. To save your settings, click OK.

Settings Description

Add Helps you exclude a URL from being detected as malicious or phishing. Delete Helps you delete a URL from the Excluded URL list. Report Helps you report if a URL is miscategorized.

Web Categories There are certain concerns that most organizations may face:  System infection by malware.

73 Settings

 Users browsing unwanted websites.  The employees idling away time. To avoid these concerns the administrators need to have a policy that regulates users and their web access activities. The Web Categories feature helps the administrators centrally control and manage the browsing behavior of the users. The administrators can create different security polices for different groups according to their requirements and priorities.

The Web Categories feature is available only in the clients with Microsoft Windows and Mac operating systems.

To configure Web Categories, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Web Security. 3. Under Web Categories, select Restrict access to particular categories of Websites. The web categories are enabled and you can allow or deny access to each category. 4. Under Status to each category, select either Allow or Deny.

Exclusion for Web Categories Exclusion helps you apply an exception rule to the protection policy for Web Categories. This helps you when you want to restrict access to a website category but you want to allow certain websites from the restricted category. You can enlist such websites in the Exclusion list in the following way: 1. Under the Web Categories screen, click the Exclusion button. The Exclude URLs dialog appears 2. In the Enter URL text box, type the URL and then click Add. The URL is added in the Exclude URL list. 3. Select Also Exclude Subdomains if you want to exclude the subdomains also. 4. To save your settings, click OK.

Settings Description

Add Helps you exclude a URL from being restricted even if it belongs to the blocked category. Delete Helps you delete a URL from the Excluded URL list.

Block specified websites This feature is helpful in restricting access to certain websites or when a website does not fall into an appropriate category. It is also helpful if you have a shorter list of the websites that you would prefer to restrict the websites than blocking the entire category. To block websites, follow these steps:

74 Settings

1. On the Web Security screen, select Restrict access to particular Websites under Block specified websites. The Block specified websites features (Add, Delete, Delete All) are activated. 2. To add a website, click Add. 3. On the Add URL screen, type a URL in the Enter URL text box. If you want to block subdomain select Also Block Subdomains. For example, if you block www.google.com and select 'Also block subdomains', all its subdomains such as mail.google.com will also be blocked. 4. To save your settings, click OK.

 The Block specified websites feature is available only in the clients with Microsoft Windows and Mac operating systems.  The Also Block Subdomains feature is not applicable for the clients with Mac operating systems.

Application Control Organizations usually face the following concerns while using applications:  No illegal or fake applications should be installed on client systems.  Malicious applications should not infect the systems.  Unnecessary applications should not clog the systems. With this feature, the administrators can authorize or unauthorize the users to access and work with certain applications, so that no one accesses an unwanted application. If the users try to access an unauthorized application, a notification can also be sent to the users about why they cannot access the application. The administrators can create various policies based on the requirement of the groups or departments. For example, for the users of the Marketing Dept., you can allow access to File Sharing Applications and Web Browser while restrict access to all other applications. For the Accounts Dept., you can allow access to Archive Tools and Web Browsers only.

The Application Control feature is available only in the clients with Windows operating systems.

To create a policy for Application Control, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Application Control. 3. To block access to an application, select Block unauthorized application when accessed. 4. If you want to send a notification when a blocked application is accessed, select Notify clients when an unauthorized application is blocked. 5. Select either Authorized or Unauthorized to each application category as per your requirement. You can also customize the setting to the application category by clicking the Custom button.

75 Settings

6. To save your setting, click Save Policy.

Custom You can customize the application settings that would authorize or unauthorize specific applications or categories. If you authorize or unauthorize an application category, all the applications listed under that category are either allowed or blocked. For example, from the application category 'Email Clients', you can unauthorize access to 'Thunderbird', and 'MailWasher' and authorize access to all the other applications. Similarly, for the application version ‘Thunderbird', you can unauthorize access to 'Thunderbird 1' and authorize access to all the other versions of that application. You can customize the applications in the following way: 1. Under Application Control, click Custom to an application category. Ensure that the option Block unauthorized application when accessed is selected, only then you can click the Custom option. A list of applications under the selected application category appears 2. In the list of applications, select all application names that you want to unauthorize and leave out those that you want to authorize. 3. To save your setting, click Save Policy.

Add Application This feature allows you to add a new application to the default list. Adding and unauthorizing of an application or file that belongs to the operating system or other system specific aspects may cause system malfunction. Hence it is advised to add an application that is not a part of operating system or other system related programs. You can add an application in the following way: 1. On the Application Control screen, click the Custom Applications button under Add Application 2. On the Custom Applications screen, click Add Application. 3. Browse and give the path to the application. 4. In the Application Name text box, type an application name. 5. In the Application Category list, select a category. You can also write a reason for adding a new application to the default list of applications. This helps Quick Heal to improve the quality of the software product. You can also submit the application metadata to the Quick Heal lab. 6. To add the application, click Add Application.

Submit Application metadata to Quick Heal lab With this option, you can send metadata of an application to the Quick Heal lab for including it in the application categories. Metadata includes information of application such as its Name,

76 Settings

Version, Company Name, and MD5. You can also provide the reason for adding the application. This information will help us to improve the Application Control module. Application Categories include thousands of applications based on their functionalities. If you block a category, all the applications in that category are blocked. However, if you have unauthorized an application category but an application is not yet blocked, you can submit that application. Quick Heal analyzes the application and then enlists it in the category. Note:  User may get application blocked prompt even while copying or renaming any unauthorized application.  Some unauthorized applications may start in case the application executable is updated due to software update. Such applications can be added to Endpoint Security Console and you are recommended to submit the Metadata to the Quick Heal lab.

Advanced Device Control While working with data storage devices such as CD/DVDs and USB-based devices such as pen drives, organizations are concerned with the following:  Client systems are clean and no malware is installed on them.  Autorun feature does not activate any infection.  Unnecessary data or applications do not clog the systems. This feature allows the administrators to create policies with varying rights. For example, administrators can block complete access to removable devices, give Read only and no write access so that nothing can be written on the external devices. They can also customize access to admin configured devices. Once the policy is applied to a group, the access rights are also applied. You can use the exception list to exclude the devices from the device control policy.

 On Windows 2000 and Windows XP SP1 and below Operating Systems, you will not be able to block devices other than USB storage devices.  Advanced Device Control feature is available in the clients with Windows and Mac operating systems.

To create a policy for Advanced Device Control, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the left pane of the Settings screen, click Advanced Device Control. 3. To enable select Enable Advanced Device Control. 4. Under Select Access policy for Device Types, select a category from the following:  Storage Device  Card Readers  Wireless  Mobile & Portable devices

77 Settings

 Interface  Camera  Others 5. For the corresponding device under that category select one of the following as per your requirement:  Block  Allow  Read only Note: Options under any category are available only if you select that category. 6. To save your setting, click Save Policy on the left pane. This policy is applied to all the devices that are configured in the list. Even if you add a device, the same policy will apply unless you customize the policy. Note: For Windows Client  Only formatted USB Pen Drives with NTFS File System can be added for authorization.  USB Pen Drives with GUID Partition Table (GPT) Partition Style cannot be added for authorization.  If an authorized and encrypted device is formatted, the device will be treated as unauthorized. Hence, Administrator will need to add the device again in Device Control and configure the policies accordingly.  USB devices connected to the systems in the network of QHEPS 6.0 server will not be enumerated in Admin Settings > Server > Manage Devices > Add Devices > Network Devices list.  Some devices (eg. Nokia phones, BlackBerry phones) may need system reboot or device re-attachment for device access rights to be applied.  On blocking SATA Controller from Advanced Device Control, you may frequently see SATA Controller blocked prompts even when actual blocking is not performed.  Some Mobile Phones or Smartphones connected in USB mode will be detected under "USB Storage Device" category and can be controlled by the same category i.e "USB Storage Device" in Advanced Device Control.  While any ongoing session of Webcam or Bluetooth is in progress, changing access right to block will not interrupt this current ongoing session. The device may need re- attachment or system reboot for access rights to be applied.  External CD/DVD reader will not be enumerated in Admin Settings > Server > Manage Devices > Add Devices > Network Devices list and also exception rule cannot be created for the same. For Mac Client

78 Settings

 If the option Read only is selected in Advanced Device Control of QHEPS and a USB device is attached, such a device may not be accessible from the left pane in Finder for some time.  If a USB device is already attached to the machine and you are installing Mac client, the device may not be shown as mounted for a fraction of seconds.  If an NTFS USB device is attached to the machine during installation of Mac client, two copies of the attached USB may be visible for a few seconds.  If a USB device is to be shown as mounted or un-mounted using terminal commands, the Device Control policy will not apply to that device.  If you are installing Mac client on Mac OSX 10.9 while an FAT USB device is attached to the machine, such a device will not be displayed as mounted. To show the device mounted, you need to disconnect the device and reconnect it.  iDevices,Webcam,CD-DVD may need device re-attachment for device access rights to be applied.  Exception functionality will not be applicable for Bluetooth,Wi-Fi,Webcam,External CD- DVD.  All mobile phones except iDevices will be detected as USB Storage device.  Blocking functionality will not work for Blackberry Mobile if the mobile is connected to Mac system in Sync Media mode and for some Android mobile if connected to Mac system in "MTP" mode.  Blocking functionality will not work for External Hard disk.

Adding exceptions to the device control list You can add exceptions for removable devices that are used by authorized persons so that the devices are excluded from the policy. To add devices to the exceptions list you must first authorize the devices by adding the device to the server. To do so, 1. Log on to the web console of Quick Heal EPS 6.0 2. Click Admin Settings > Server > Manage Devices. 3. Click Add Devices. 4. Select from Network Devices, USB Devices, or Other Devices. If you want to add a USB Device, select USB Device and in the Add Device dialog box, add the device name and click OK. If you want to add a network device, select Network Devices. The list of devices detected in the network is displayed. Select the device and click OK. If you want to add any other device, select the Other Device option, select device type, and in the Add Device dialog box, add the required details such as Device name, Device Vendor ID, Product ID, and the serial number. Click OK,

79 Settings

5. Click Settings > Client Settings > Advanced Device Control. Ensure that the option for Enable Advanced Device control is selected. 6. Click Exceptions. 7. Click Add. 8. Select the device(s) to add to exception from the devices displayed in the list. 9. Click OK. 10. Click Yes to the Managed Devices confirmation dialog box. 11. Set the access permissions as required. 12. Click Save Policy.

Adding Device to Server To know about how to add a device to the server, see Manage Devices.

Data Loss Prevention You can now prevent unauthorized loss, pilferage, or leakage of confidential company data using the Data Loss Prevention (DLP) feature of the EPS 6.0. You can also view a report of the users who attempted to cause the unauthorized leakage of confidential data. See Reports for Data Loss Prevention for more information. The DLP feature can stop any such unauthorized activity that is carried out through the following channels:  Using the Print Screen option to save the screenshot (Applicable only for Windows platform)  Using Removable Devices to copy data (Applicable only for Windows platform) For selected File Types, the Removable Devices go to ‘Read Only’ mode when ‘Monitor Removable Devices’ option is selected.  Using Network Share accessed using UNC Path or Mapped Network Drive (Applicable only for Windows platform)  Using the Clipboard to paste information from one application to another  Using online services of third-party Application/Services to send data such as email, file sharing apps, cloud services, web browsers and other applications using social media. You can also identify the type of data that you want to monitor such as: 1. File Types  Graphic Files (Audio, Video, Images)  Office Files (MS Office, Open Office, Office)  Programming Files  Some Other File Types (Compressed files etc.)

80 Settings

2. Confidential Data  Confidential data such as Credit/Debit Cards  Personal information such as Social Security Number (SSN), Email ID, Phone Numbers, Driving License Number, Health Insurance Number, Passport Number, ID, International Banking Account Number (IBAN). 3. User Defined Dictionary where you can specify the word(s)/string(s) that must be flagged if used in communication. Note: Confidential Data & User Defined Dictionary Data will not be monitored and blocked if it is in the Subject Line or Message Body of email, instant messenger communication. You can either choose to be notified through email notification when an attempt is made to leak information, or prevent the attempt from being carried out successfully. Note:  Data Loss Prevention feature is not available in both EPS Business and Total flavor. User need to purchase a DLP pack separately to avail this feature.  DLP feature is not available on Windows 2000 Operating System.

Monitoring /preventing leakage of data 1. Log on to the web console of Quick Heal EPS 6.0. 2. Go to Settings > Client settings >Data Loss Prevention Select the option to enable Data Loss Prevention. You can choose to select the option for an Alert message on the endpoint on which an attempt is made at data leakage. 3. Next, select the channels that you want to monitor from the following:  Disable Print Screen (applicable only in Windows platforms)  Monitor Removable Devices (applicable only in Windows platforms)  Monitor Network Share (applicable only in Windows platforms)  Monitor Clipboard  Monitor Data Transfers through Application/Online Services 4. Select the applications that you want to monitor for attempts at data pilferage by clicking on the Applications drop down list. Do one of the following: You can select all the applications in the group  Select the applications one by one after expanding the group caret.  Select all Mac platform applications by clicking the Mac group icon.  Select all Windows applications by clicking on the Windows icon.  Select all Web Browsers or one by one after expanding the group caret.  Select all E-mail applications or one by one after expanding the group caret.

81 Settings

 Select all Instant Messaging applications or one by one after expanding the group caret.  Select all File Sharing/Cloud Services applications or one by one after expanding the group caret.  Select All Social Media/Others applications or one by one after expanding the group caret 5. Next, configure the settings for File Types, Confidential Data and User Defined Dictionary. 6. Configure the action to be performed after the attempts is carried out, i.e. Block and Report or Report only. Alert prompts will not be displayed for Report Only action. Screenshot cannot be taken even when "Report only" action is selected for "Disable Print Screen" 7. Click Save Policy.

Note: For Mac Client:  Confidential & User Dictionary Data will not be blocked in subject line, message body of email or messenger communication.  Prompts and report will be generated in case if monitored file type is downloaded.  Certain file types(POT,PPT,PPTX,DOC,DOCx,XLS,XLSX,RTF) containing unicode data will not be blocked.

File Activity Monitor This feature lets you monitor any suspicious activity related to the confidential files on your computer, a network drive or a removable drive. Apart from a default set of files, you can customize and select the file types that you want to monitor. You can monitor the selected file types for actions such as copy, delete, or rename. You can generate a report for the file activity from the Reports page.

The File Activity Monitor feature is available in the clients with Windows and Mac operating systems.

Enabling File Activity Monitor To enable file activity monitor follow the given steps: 1. Log on to the web console of Quick Heal EPS 6.0. 2. Go to Settings > Client settings > File Activity Monitor. 3. Select “Enable File Activity Monitor.” 4. In the "Select File Types and Events to monitor within drives” area, place a check mark to select the drives that you want to monitor for file activity.

82 Settings

Note: Selection of event is not applicable for Removable Drives, Network Drives. You can select to monitor only ‘delete’ activity for local drives. For Removable Drives you can select 'All Files' to be monitored. 5. In the File types list, select the file types that you want to monitor for all the drive types or you can select all the file types listed by using 'All File Types' check box. 6. In the Custom Files, you can add your own file types that you want to exclude. Click + to add a new file type extension to be monitored. Use the delete icon to remove a file or folder type. 7. Enter the folder paths that you want to exclude from the monitoring, for e.g. C:\Manoj. To remove a folder path from the exclusions, click on the delete icon which appears when you click on the list entry. If you click on the delete icon, a message box is displayed to confirm the delete action. 8. Click Save Policy.

Update Settings When a work environment has a large number of systems installed, the challenge that the administrators usually face is how to update all the endpoints for security patches. This feature allows you to create policies for taking the updates automatically for the endpoints. You can create polices that help different clients take the updates from different sources. Taking the updates from different sources reduce the load on a single server. The following table shows a comparison of the features in Update Settings that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Enable Automatic Update Show update notification window X Frequency X Update Mode To create a policy for Update Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Update Settings. 3. To take the updates automatically, select Enable Automatic Update. 4. To display notification window when the updates are taken, select Show update notification window. 5. Under Frequency, set the schedule when you want to take the updates.  Automatic  As per schedule

83 Settings

If you select As per schedule, Daily Start time and Repeat after are activated that you can set as per requirement. 6. To set how to take the updates, select one of the following options under Update Mode:  Download from Internet  Download from Endpoint Security Server  Download from Specified Update Servers For creating different policies, you can select different options for Update Mode. If you select Download from Specified Update Servers, you should enter the update server locations in the list. 7. To save your settings, click Save Policy.

 If you select the option Download from Specified Update Servers, the Linux client will download the updates from the Endpoint Security server.  If a client is on roaming mode and has enabled Roaming Client, the client will try to take the updates from the Endpoint Security Server. If the server is not reachable, the updates will be automatically taken from the Internet Center.  The Roaming Client feature is available only in the clients with Microsoft Windows operating systems.  To know for which clients the asterisked features are applicable, see the comparison table.

Entering update server locations If you select the Download from Specified Updates Servers option, you are advised to enter the update server location to take the updates. In case of large networks, you can also deploy multiple Update Managers. This helps load balancing as the endpoints can take the updates from different servers. If you have configured multiple Update Managers in your network, specify their URLs in this section. You can configure clients to take the updates from these locations in Client Settings. To enter a server location, follow these steps: 1. On the Quick Heal Endpoint Security Dashboard, click Home. 2. On the Home page, click the Update Manager link, available next to the product name and version details. 3. On the Update Manager screen, click Alternate Update Managers. 4. In the Enter Update Manager URL text box, type a URL and then click Add. You can arrange the URLs according to your priority. The URLs added will be available in the update server location list in Update Settings.

Internet Settings This feature gives the administrators a wider choice of creating policies for the client modules that need Internet connection to function. You can configure different settings for the server and port so that the client modules such as Quick Update, Spam Protection, Web Security, and

84 Settings

Messenger have Internet connection. This is very helpful in allowing the client modules to function in a secure work environment where default Internet connection is not allowed. To create a policy with Internet Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click Internet Settings. 3. To set the proxy setting for Internet, select Enable Proxy Setting. The proxy settings details are activated. 4. In Proxy Type, select the proxy type that you need for Internet connection. Proxy types include: HTTP Proxy, SOCKS V4, and SOCKS V5. 5. In Proxy Server, type the sever name. 6. In Port, type the port number. You can also set authentication rule if you use Firewall or proxy server. For this, type the User name and Password under Authentication. 7. To save your setting, click Save Policy.

The Internet Settings feature is applicable for the clients such as Microsoft Windows, Mac, and Linux operating systems.

General Settings This feature allows you to create a policy that authorizes the clients to access client settings and change their own password, enable or disable Safe Mode Protection, Self Protection, and News Alert. The following table shows a comparison of the features in General Settings that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Authorize access to the client X settings

Enable Safe Mode Protection X X Enable Self Protection X X Enable News Alert X X To create a policy for General Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, click General Settings. 3. To give access to the client settings, select Authorize access to the client settings*. Password setting is activated.

85 Settings

4. In Enter Password, type the password and then re-type the same password in Confirm Password. The clients will have to use these passwords for accessing the client settings. 5. To activate Safe Mode Protection, select Enable Safe Mode Protection*. 6. To activate Self Protection, select Enable Self Protection*. 7. To get the news alert about various incidents, select Enable News alert*. 8. To save your setting, click Save Policy.

To know for which clients the asterisked features are applicable, see the comparison table.

Schedule Settings

Scanning regularly keeps the systems clean and safe. In a large organization the client systems may be installed in physically separated environments. To centrally manage all the systems about how to scan and when to initiate scanning, the administrator must have a policy. This feature helps you create policies for scheduling scans for the client systems. You can schedule scanning for the following.

Client Scan This feature allows you to create polices to initiate scanning the clients automatically at a convenient time. You can define whether the scan should run daily or weekly, select scan mode (Quick Scan, Full System Scan). You can also enable Antimalware while scanning. This will supplement other automatic protection features to ensure that the client systems remain malware- free. The following table shows a comparison of the features in Client Scan that are applicable for different Quick Heal Endpoint Security clients on different operating systems:

Clients Features Windows Mac Linux

Client Schedule Scan Antimalware Scan Settings X X To create a scan schedule policy for Client Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, go to Schedule Settings > Client Scan. 3. Configure the following settings: Client Schedule Scan, Scanner Settings, and Antimalware Scan Settings. 4. To save your settings, click Save Policy.

86 Settings

Note: You can revert to the default settings whenever you prefer by clicking the Default button.

Client Schedule Scan This feature helps you define scan schedules for the clients at a certain frequency. To configure Client Schedule Scan, follow these steps: 1. Under Client Schedule Scan, select Enable Schedule Scan 2. In Frequency, select either the Daily or Weekly option. 3. In Start At, set time in hours and minutes. 4. If you want to repeat scanning of your clients, select Repeat Scan and set the frequency after what interval the scan should be repeated. 5. To get notification when a client is offline, select Notify if client is off-line.

Scanner Settings This feature helps you define what scan mode you prefer for scanning the clients or what items you want to scan. To configure Scanner Settings, follow these steps: 1. Under How to Scan, select a scan mode from the following:  Quick Scan (Scan Drive where operating system is installed)  Full System Scan (Scan all the fixed drives) 2. To set optimal setting, select the Automatic option. 3. To set advanced setting, select the Advanced option. If you select the Advanced option, further settings such as scan items and scan types are activated. 4. Under Select items to scan, select any of the following:  Scan executable files  Scan all files (Takes longer time)  Scan packed files  Scan mailboxes  Scan archives files 5. If you select the Scan archives files option, you can set the following also:  Archive Scan Level: You can set up to level 5.  Select action to be performed when virus is found in archive file: You can select one of the actions from Delete, Quarantine, and Skip. 6. In Select action to be performed when a virus is found, select an action from the following: Repair, Delete, Skip.

87 Settings

Antimalware Scan Settings This feature helps you enable scanning for malware. To configure Antimalware Scan Settings, follow these steps: 1. To enable scanning for malware, select Perform Antimalware scan. 2. In Select action to be performed when malware found, select an action from the following: Clean and Skip.

Scan packed files, Scan mailboxes, and Antimalware Scan Settings are available only in the clients with Windows operating system.

Application Control This feature allows you to create polices to initiate scanning of the applications installed on the clients automatically at a convenient time. It also helps you scan all authorized and unauthorized applications present on the clients. To create a policy for scanning applications, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, go to Schedule Settings > Application Control. 3. Configure the following settings: Application Control Schedule Scan and Scan and Report. 4. To save your setting, click Save Policy. Note: You can revert to the default settings whenever you prefer by clicking the Default button. The Application Control Schedule Scan feature is available only in the clients with Windows operating systems.

Application Control Schedule Scan This feature helps you define schedules to scan applications at a preferred or specified frequency. To configure Application Control Schedule Scan, follow these steps: 1. Under Application Control Schedule Scan, select Enable Schedule Scan 2. In Frequency, select either the Daily or Weekly option. 3. In Start At, set time in hours and minutes. 4. If you want to repeat scanning for the applications, select Repeat Scan and set the frequency of interval after which the scan should be repeated. 5. To get notification when a client is offline, select Notify if client is off-line.

Scan and Report This feature allows you to initiate scanning of the applications in various ways. Under Scan and Report, select one of the following options:  Unauthorized applications  Unauthorized and authorized applications

88 Settings

 All installed applications

Tuneup This feature helps you create polices to tune up the clients automatically at preferred time and intervals. To create a policy for Tuneup, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab 2. On the Settings screen, go to Schedule Settings > Tuneup. 3. Configure the following settings: Tuneup Schedule Scan and Tuneup Settings. 4. To save your setting, click Save Policy. Note: You can revert to the default settings whenever you prefer by clicking the Default button. The Tuneup Schedule Scan feature is available only in the clients with Windows Desktop operating systems.

Tuneup Schedule Scan This feature helps you define schedules to tune up the clients at the preferred frequency. To configure Tuneup Schedule Scan, follow these steps: 1. Under Tuneup Schedule Scan, select Enable Schedule Scan 2. In Weekday, select a day of the week. 3. In Start At, set time in hours and minutes. 4. If you want to repeat scanning, select Repeat Scan and set the frequency after what interval the scan should be repeated. 5. To get notification when a client is offline, select Notify if client is off-line.

Tuneup Settings This feature helps you define how the tuneup process should run and what should be cleaned. You can select either or all of the following options:  Disk cleanup  Registry cleanup  Defragment at next boot

Vulnerability Scan This feature helps you schedule vulnerability scan for the clients so that the clients are scanned for possible vulnerabilities. To create a policy for Vulnerability Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Settings tab

89 Settings

2. On the Settings screen, go to Schedule Settings > Vulnerability Scan. 3. Configure the following settings: Vulnerability Scan and Scan and Report. 4. To save your setting, click Save Policy. Note: You can revert to the default settings whenever you prefer by clicking the Default button. The Vulnerability Scan feature is available only in the clients with Windows operating systems.

Scheduling Vulnerability Scan This feature helps you define schedules to initiate vulnerability scan of the clients as per your convenience. To schedule Vulnerability Scan, follow these steps: 1. Under Vulnerability Scan, select Enable Schedule Scan 2. In Weekday, select a day of the week. 3. In Start At, set time in hours and minutes. 4. If you want to repeat scanning, select Repeat Scan and then set the frequency after what interval the scan should be repeated. 5. To get notification when a client is offline, select Notify if client is off-line.

Scan and Report Under Scan and Report, select any of the following:  Microsoft applications and other vendor applications  Microsoft applications only  Other vendor applications only

90

Chapter 11. Reports

This menu provides the latest information of all clients and keeps comprehensive logs about virus incidents, policies, and updates. It gives the latest status of all the connected online clients and the last update report of the offline clients. Use these logs to assess virus protection policies of your organization and identify clients that are at a higher risk of infection. You can use these logs to verify if the clients have the latest updates.

Client

This feature helps you view the reports of all online and offline clients. The reports of clients are available on the following modules: Virus Scan, AntiMalware Scan, Web Security, Tuneup, Advanced Device Control, Application Control, IDS/IPS, Firewall, Vulnerability Scan, File Activity Monitor, and Asset Management.

Viewing Reports of Virus Scan This feature helps you generate reports about whether any virus is found after scanning the clients through the Virus Protection, Scanner Scheduler, Memory Scan, and Email Protection modules. To view reports of Virus Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Virus Scan. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a Group Name and an Endpoint Name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 5. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF.

91 Reports

This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. File Name Displays the file names that are infected with viruses. Virus Name Displays the virus names that infect the files. Action Taken Displays the actions that were taken against viruses. View Details Displays further details for a report. To view the details, click the View Details link.

Viewing Reports of AntiMalware Scan This feature helps you generate reports about whether any malware is found after scanning the clients through the Schedule Scan and On Demand Scan modules (Clients > Client Action > Scan). To view reports of Antimalware Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > AntiMalware Scan. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a Group Name and an Endpoint Name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 5. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. Name of Malware Displays the malware names.

92 Reports

Type of Malware Displays the malware types. Action Taken Displays the actions that were taken against the malware attack.

Viewing Reports of Web Security This feature helps you generate reports on whether any websites were blocked through the Browsing Protection, Phishing Protection, or block websites modules (Settings > Client Settings > Web Security). To view reports of Web Security, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Web Security. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a group name and an endpoint name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 5. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. Note: In case of Business flavor of Quick Heal Endpoint Security only the Tabular format report for Web Security is available. This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. Blocked Websites Displays the websites that were blocked. Category Displays the category the blocked websites belong to.

Viewing Reports of Tuneup This feature helps you generate reports on how many clients were tuned up and how many were not tuned up at all (Clients > Client Action > Tuneup). To view reports of Tuneup, follow these steps:

93 Reports

1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Tuneup. The reports are displayed in chart format. 3. To generate reports for a group, select the Group Name. 4. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 5. To generate the report on the selected parameters, click Generate. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can print it or can also save it as CSV or PDF. This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when Tuneup is performed. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. Tuneup Status Displays whether the client was tuned up. Last Performed Displays when last Tuneup was performed.

Viewing Reports of Advanced Device Control This feature helps you generate reports on polices for device control such as whether removable devices have been blocked and what actions were taken against unauthorized devices (Settings > Client Settings > Advanced Device Control). To view reports of Advanced Device Control, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Advanced Device Control. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a Group Name and an Endpoint Name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 5. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters.

94 Reports

If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF.

Device Control prompts and reports will not be generated for "Network Share". This report page for Advanced Device Control displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. User Name Displays the user name that belongs to the domain. Device Name Displays the device name that breached the policy. Device Type Displays the device type of the device. Serial Number Displays the serial number of the device. Action Taken Displays the action that was taken against the violation of the Device Control policy.

Viewing Reports for Data Loss Prevention (DLP) This feature helps you generate and view reports related to attempts at pilfering or copying data in an unauthorized manner. The report pinpoints the user, endpoint on which the attempt was carried out, the time and channel of operation.

Viewing reports for DLP 1. Log on to the web console of EPS 6.0 2. Click Reports > Client > Data Loss Prevention. 3. Enter the start date and end date for the period you want the data for. 4. Select the Group name. 5. Select the channel through which the suspected activity might be carried out. 6. Select Report Type Chart / Tabular 7. Click Generate. 8. Click Chart / Tabular to change between the chart and tabular versions of the same report. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters.

Prompts and reports will not be generated for "Disable Print Screen" functionality.

Viewing Reports for Application Control This feature helps you generate reports on how many applications were accessed or installed or whether they were authorized or unauthorized applications.

95 Reports

The reports on Application Control can be generated for On Access Scan and Application Installed separately.

On Access Scan To view reports for On Access Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab. 2. On the Reports page, select Client > Application Control. 3. On the General Reports page, click the On Access Scan tab to generate reports on the applications that were accessed. 4. Select the start and end dates for the reports. 5. Select a Group Name and an Endpoint Name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 6. Select the Report Type. The report can be displayed both in Chart and Tabular forms. 7. To generate the report on the selected parameters, click Generate. After clicking Generate button, Collapsible Summary will be displayed. In addition, if you want to change the parameters then you can do it by using Modify Parameters button. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. User Name Displays the user name that belongs to the domain. Blocked Application Displays the applications that were blocked. Application Version Displays the version of the applications that were blocked. Application Category Displays the category of the blocked applications. Application Path Displays the path of the blocked applications where they were installed.

Application Installed To view reports for Application Installed, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Application Control.

96 Reports

3. On the Generate Reports page, click the Application Installed tab to generate reports. 4. Select the start and end dates for the reports. 5. Select a Group Name and an Endpoint Name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, Collapsible Summary will be displayed. In addition if you want to change the parameters then you can do it by using Modify Parameters button. You can take the print of the generated report or can also save the report as CSV or PDF using the respective buttons. This report page displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Group Name Displays the group name that the selected client belongs to. Module Name Displays the module name that scanned the applications. Summary Displays the summary of the installed applications. View Details Displays further details of the installed applications. To view the details, click the View Details link. It also includes information of what authorized and unauthorized applications are present on client machine.

Viewing Reports of IDS/IPS This feature helps you generate reports on whether there was any Port scanning attack, DDOS (Distributed Denial of Service) attack, or any attempt of intrusion, and what actions were taken. To view reports of IDS/IPS, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > IDS/IPS. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a Group name and an Endpoint name. If you want to generate reports for a group, leave the endpoint name text box blank. If you want to generate reports for an endpoint name, enter the endpoint name in the text field. The reports will be generated for that endpoint name. 5. In Report For, select the attack type for which the report is to be generated. The report can be generated for the following modules: Intrusions Prevention, Port Scanning, and DDOS Attack.

97 Reports

6. To generate the report on the selected parameters, click Generate. After clicking Generate button, Collapsible Summary will be displayed. In addition, if you want to change the parameters then you can do it by using Modify Parameters button. You can take the print of the generated report or can also save the report as CSV or PDF using the respective buttons. This report page on Intrusion Prevention displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Vulnerability Detected Displays the vulnerability detected in a client. Action Taken Displays the actions that were taken against the attack. View Details Displays further details of the installed applications. To view the details, click the View Details link. This report page on Port Scanning displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Attacker IP Displays the IP address of the attacker. Attacker MAC Displays the MAC address of the attacker. Address Scanned Ports Displays the Ports that were scanned. Action Taken Displays the actions that were taken against the attack This report page on DDOS displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Attacker IP Displays the IP address of the attacker. Attacker MAC Displays the MAC address of the attacker. Address Action Taken Displays the actions that were taken against the attack.

98 Reports

Viewing Reports of Firewall This feature helps you generate reports on the protection policy for Firewall such as the blocked traffic for communications (Inbound or Outbound) and Firewall security level (Settings > Client Settings > Firewall). To view reports of Firewall, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Firewall. 3. On the General Reports page, select the start and end dates for the reports. 4. Select a Group name and an Endpoint name. If you want to generate a report for a group, leave the endpoint name text box blank. If you want to generate a report for an endpoint name, select the group name and then type an endpoint name. The report will be generated for the endpoint name that belongs to the selected group. 5. To generate the report on the selected parameters, click Generate. After clicking Generate button, Collapsible Summary will be displayed. In addition, if you want to change the parameters then you can do it by using Modify Parameters button. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. This report page on Firewall displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Local IP Displays the local IP address. Remote IP Displays the remote IP address. Protocol Displays the Protocol name. Direction Displays the direction of the blocked communication traffic. Firewall Level Displays the level of the Firewall security policy. View Details Displays further details of the installed applications. To view the details, click the View Details link.

Viewing Reports of Vulnerability Scan This feature helps you generate reports on vulnerabilities present in the endpoints in the network. Reports can be filtered based on any of the following categories:  All Vulnerability  Severity  Vendor

99 Reports

 Top Vulnerability To view reports of Vulnerability Scan, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Client > Vulnerability Scan. 3. On the Generate Reports page, select the start and end dates for the reports. 4. Select a Group name and an Endpoint name. If you want to generate a report for a group, leave the endpoint name text box blank. If you want to generate a report for an endpoint name, select the group name and then type an endpoint name. The report will be generated for the endpoint name that belongs to the selected group. 5. In Report Type, select the type of report you want to generate. 6. To generate the report on the selected parameters, click Generate. After clicking Generate button, Collapsible Summary will be displayed. In addition, if you want to change the parameters then you can do it by using Modify Parameters button. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. This report page on Vulnerability Scan displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint for which the report is generated. Domain Displays the domain to which the selected client logs in. Vulnerability ID Displays the unique CVE-ID of a vulnerability incident. Vulnerability Title Displays the description of a vulnerability incident. Severity Displays the criticality of a vulnerability incident. Vendor Displays the name of a vendor from where the vulnerability is reported. View Details Displays further details of the vulnerability. To view the details, click the View Details link.

Reports for File Activity Monitor This feature lets you view reports for suspicious file activity as per the configured settings. You can generate the reports using the following parameters:  Start date  End date  Location  Group name  Endpoint name

100 Reports

 Event Reports are available in a tabular format or a pie chart format. The report also displays the information about the attempts made, the name of the user, the endpoint name and the number of incidents for all the local, network or removable drives. You can click on the link above the charts to view the file type split up against locations. You can also view a summary of the activity for a particular file type such as deleting a file. You can view the file activity related to a person.

Viewing reports for file activity 1. Log on to the Quick Heal Endpoint Security web console 2. Click Reports > Clients > File Activity Monitor 3. In the Generate Reports section, enter the start date and end dates between which you want to monitor file activity. 4. Select the location, group name, Endpoint name and the type of event you want to monitor. 5. Click Generate. The report is generated and displayed on the screen. You can switch between a tabular view and a pie-chart view. After clicking Generate button, a collapsible summary is displayed. If you want to change the parameters, click Modify Parameters. If you generate the report in chart format, you can print the report by clicking the Print option. If you generate the report in tabular format, you can also save the report as CSV or PDF. This report page for File Activity Monitor displays the following details of the clients:

Fields Description

Date and Time Displays the date and time when the report is generated. Endpoint Name Displays the name of the endpoint. Domain Displays the domain to which the selected client logs in. File Name Displays the file name which is being monitored. Location Displays the type of Drive. User Name Displays the user name that belongs to the domain. Details Displays the details of the event.

Reports for Asset Management The Asset Management tab on the Reports page lets you generate reports related to the assets or the Endpoints. You can generate these reports for a particular period, group-wise, or for a particular Endpoint. Reports are available in a bar and chart format. You can also choose the category of report required, i.e. a hardware changes report or a software changes report. You can print these reports if required.

Viewing reports for asset management 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab.

101 Reports

2. On the Reports page, click Asset Management. In the Generate Reports area, enter or select the criteria for the required report. You can generate a report for a particular period, or select the type of report required, or look up the report for a particular endpoint by entering the name of the endpoint in the corresponding field. 3. Select the Report type, whether bar chart or tabular. 4. Click Generate. The report is displayed on the screen. Use the print icon if you want to print the report.

Server

This feature helps you check the event logs of all the incidents that took place on server. To view the event logs on Server, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, click the Server tab. 3. Select the start and end dates for the reports. 4. On the Event Logs page, select the category for the reports. You can print the report or save the report as CSV or PDF using their respective buttons. You can also delete the event logs, if you prefer.

Fields Description

Delete Helps you delete the event logs. Print Helps you take the print of the event logs. CSV Helps you save the report in CSV format. PDF Helps you save the report in PDF format.

Manage

This feature helps you manage the reports generated on server and clients. You can set when the reports can be removed automatically. You can also export the reports and delete them manually.

Managing Settings This feature helps you set when to remove the reports automatically in the following way: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Manage > Settings. 3. On the Settings page, set the following:  In Automatically delete reports older than…days, set the number of days when the reports should be deleted automatically.  In Automatically email reports for past… days to following recipients, set the number of past days for which the reports are required.

102 Reports

 In the Email Address text box, type the email addresses. If you type multiple email IDs, separate them by a comma. 4. Under Email Frequency, set frequency and time when the reports should be sent. 5. Under Select Reports to email, set the types of reports that you want to email. 6. To save your settings, click Save. Note: If any module contains more than 1000 records, then only latest 1000 records will be mailed.

Managing Export This feature helps you export the reports in PDF in the following way: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Manage > Export. 3. Under Select Criteria, select what reports you want to export from the following:  To export all the reports, select All Reports.  In As per below criteria, set the criteria such as start date and end date, select a group name, and then type an endpoint name. 4. Under Select Reports, select the modules for which you want to export the reports. The modules of the flavor of Quick Heal Endpoint Security that you might have are displayed. 5. After setting all the criteria, click Export to export the reports in PDF.

Managing Delete Reports This feature helps you delete the reports manually in the following way: 1. Log on to the Quick Heal Endpoint Security web console and then click the Reports tab 2. On the Reports page, select Manage > Delete Reports. 3. Under Manually delete reports, select one of the following options:  Delete reports older than …days: Select the number of days to remove the reports older than the days you want to.  Delete all reports: Select this option if you want to remove all the reports generated till now. 4. Under Select Reports, select the report types that you want to remove from the following:  Clients Reports  Server Reports 5. After setting the criteria, click Delete to remove the reports.

103

Chapter 12. Admin Settings

The Admin Settings section includes the following topics:

Server

This feature allows you to configure various settings related to server. This includes settings on how to send notifications and for what reasons, SMTP settings, and adding devices to allow access, redirecting server in case of need, and managing users.

Password To prevent unauthorized users from modifying your settings or removing the Quick Heal client from endpoints it is advisable that you password-protect Quick Heal Endpoint Security. Quick Heal Endpoint Security requires you to specify a console password; however, you can modify your password from the Quick Heal Endpoint Security. To change the console password, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > Change Password. 3. In the Old Password text box, type current Super Administrator Password. 4. In the New Password text box, type the new password, and then re-type the new password in the Confirm Password text box. 5. Click Apply.

Notification This feature helps you set rules for sending notifications for various events such as when virus is detected, virus is active in memory, or there is a virus outbreak. Notifications are sent against intrusion detection, if an unauthorized device or application is accessed or virus definitions get outdated. This also includes alerts for failure of synchronization with Active Directory, or any license related information etc. Notifications keep you informed about the incidents occurring across the network so that appropriate action can be taken to avoid any mishap. Notification includes the following:  Email & SMS Notification for various incidents.  Configure Email & SMS for Event Notification for creating a list of Email IDs and Mobile Numbers for sending SMS.

104 Admin Settings

Email & SMS Notification To configure Email & SMS Notification, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab. 2. On the Admin Settings page, go to Server > Notification. 3. To activate notifications to be sent, select the Select Event for which notification should be sent option under Email & SMS Notification. All other options under Notifications to be sent are activated. 4. Under Virus Infection and Virus Outbreak, select the mediums through which you want to get the notification for the following incidents:  Virus detected on endpoint  Virus active on endpoint  Virus outbreak in network You can get notifications either through Email or SMS or both. However, for Virus detected on endpoints, you can get the notification only through email. If you select the option Virus outbreak in network, you can further customize the settings on when you want the notifications. This alerts you on virus outbreaks. To customize Virus outbreak in network, follow these steps:  Next to Virus outbreak in network, click Customize.  The Virus Outbreak details screen appears.  Under Total number of virus incidents exceeds, set number of incidents and the number of systems on which the virus outbreak happens.  Under And in the time span of, set time about how often the notification will be triggered.  To save your setting, click Save. 5. Under IPS/IDS, select the events for which you want to get notifications:  Intrusion detected on endpoint  Port Scanning incident detected on endpoint  DDOS Attack detected on endpoint. Note: The notification for Intrusion Prevention can be sent through emails only. 6. Under Advanced Device Control, select the events for which you want to get notifications:  Attempt to breach the Device Control policy Note: The notification for Device Control event can be sent through email only. 7. Under Application Control, select the events for which you want to get notifications:  Attempt to access unauthorized application Note: The notification for Application Control event can be sent through email only.

105 Admin Settings

8. Under Update, select the medium through which you want to get the notification for the following incidents:  Service pack is available  Clients are not updated to latest virus definitions  Update Manager virus definition date is older Note: The notification for Clients is not updated event can be sent through email only. 9. Under Install through Active Directory, select the medium through which you want to get the notification for the following incidents:  Synchronization with Active Directory failed 10. Under Disconnected Endpoints, select the events for which you want to get notification:  Endpoint disconnected from the network due to infection  Endpoint disconnected from the network due to DDOS Attack  Endpoint disconnected from the network due to Port Scan Note: The notification for all incidents can be sent through email only. 11. Under License related, select the medium through which you want to get notification for any of the following incidents:  License expired  License is about to expire  License limit exceeds 12. Under Data Loss Prevention, enable notification for event:  Attempt to breach Data Loss Prevention policy. 13. Under Asset Management, enable notification for event  Hardware changes made in the Endpoint. 14. To save your setting, click Apply.

Configuring Email & SMS for Event Notification To configure Email & SMS Event Notification, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > Notification. 3. In Configure Email & SMS for Event Notification, click Configure. The Email & SMS Notification prompt appears. 4. In the List of Email IDs, type an email address and then click Add. You can enter multiple email addresses. 5. In the List of Mobile Numbers, type a mobile number and then click Add.

106 Admin Settings

6. To save the email addresses and mobile numbers, click Apply. 7. To save your setting, click Apply. Note: For receiving email notifications, you will need to configure SMTP settings first.

Currently notification through SMS facility is available only for the users based in India. For some events, SMS Notification may not be applicable. Mobile numbers listed in the National Do Not Call Registry (DND) list may or may not be able to receive notification depending on the Indian government's current telephone regulatory policies.

Buy Now This feature helps you buy Quick Heal Endpoint Security SMS bundle for sending notification. Number of sms left displays how many SMS notifications can be sent. As you send the notifications, this limit is consumed. . To continue sending notification, you need to have SMS limit that you can increase by buying the SMS bundle. You can buy the SMS bundle in any of the following ways:  By clicking the Buy Now link: This link will redirect you to the portal of Quick Heal Endpoint Security SMS bundle for notification where you can buy SMS bundle.  By visiting the online portal directly: You can also visit the online portal directly to buy the SMS bundle. The URL for SMS bundle is http://www.quickheal.com/in/en/psms. Note: The SMS notification bundle can be bought only if the users are based in India. On the shopping portal, follow the instructions about how to buy the SMS bundle. As soon as you buy the SMS bundle, the limit in the Number of sms left option gets updated with due limit. If you find that the limit has not been reflected, you can update it by clicking the Update License Information button. You can refresh the SMS bundle limit by updating the license information in the following way: 1. Log on to the Quick Heal Endpoint Security web console and then click the Home tab 2. On the Home page, click the View License link. 3. On the License Manager, click the Status button. 4. On the License Status screen, click the Update License Information button. Your license is refreshed to display the updated balance.

SMTP Settings This feature helps you set the SMTP Host Details. All emails from Endpoint Security Server such as Notification mails and Report mails will be sent to the SMTP Server for further routing.

107 Admin Settings

To configure the SMTP Settings, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > SMTP Settings. 3. In the SMTP Server text box, type the IP Address or domain name of SMTP server. 4. In the Port text box, type the port number. 5. In the Notify from Email Address text box, type the email address. This email address will appear as From Address in all the emails sent from EPS server. 6. For user authentication, type the user name in the User name text box. The User name field depends on your SMTP server. It may ask you to provide either user name or email ID. 7. In the Password text box, type the password. 8. In the Notify from Email Address text box, type the email address. This email address will appear as From Address in all emails sent from EPS server. 9. In User Authentication Method, select either of the following:  None: Select this option to send email notification through HTTP protocol.  SSL: Select this option to send email notification through SSL (Secure Sockets Layer) protocol.  TLS: Select this option to send email notification through TLS (Transport Layer Security) protocol. 10. To apply your settings, click Apply.

Manage Devices Use the settings listed in the Advanced Device Control feature under the Settings menu (Settings > Client Settings > Advanced Device Control) to manage the devices.

Adding exceptions to the device control policy You can add exceptions for removable devices that are used by authorized persons so that the devices are excluded from the policy. 1. On the Admin Settings page, go to Server > Manage Devices. 2. Click the appropriate device category under the Add Device drop down list that appears. The following categories are displayed:  Network Device: A list of devices connected to the network is automatically obtained.  USB Device: Use this option if you want to add a USB device that is not in the Network Device list and not connected. An Add Device dialog box appears if you select this option. Enter the device name and other details. You can also select the option in the “Make this device accessible only

108 Admin Settings

within your corporate network” to make the device inaccessible to all other system(s) that do not have Endpoint Security Client installed.  Other devices: Use this option if you want to add a device that is not connected, and not in the list. Select the device type and enter the corresponding details for that device. 3. Select the devices that you want to manage from the displayed list and click OK. After the device appears in the list, toggle the button under Authorized to Yes or No as required. You can also use the Edit icon that appears to change the device name as it appears or use the Trashbox icon to delete the device from the list. Note: If you set the device authorized permission to ‘No’, then that device cannot be added to the exceptions list. 4. To add the device to the exceptions list, go to Settings > Client Settings > Advanced Device Control. 5. Click on Exceptions tab. 6. Click Add. The Managed Devices dialog box displays the list of authorized devices. 7. Toggle the Add to Exceptions button for that device. 8. Click OK. 9. Click Yes on the Managed Devices confirmation dialog box. The device is now added in the list of exceptions. To delete a device, select the device, and then click the trash icon that appears. 10. Set the access permissions as required. 11. Click Save Policy. Note: In case you are accessing web console on Windows Vista, turn off the 'Protected Mode' option in Internet Explorer. If you are unable to add devices through the web console, you can also use the Device Control Tool to add USB Storage devices. This tool is available at the following location on the EPS Server: \Admin\dcconfig.exe

Redirection This feature helps you change the EPS Server for upgrading your EPS to new version. This helps in redirecting the existing clients to new EPS Server and thereby using the new EPS server for communication. You can select the clients or configure all of the clients to be redirected to the new server. This feature is particularly useful in cases of large networks where the clients are connected through low bandwidth lines. You can use this feature to move the clients in groups selectively to the new server so that re-direction is gradual and at your convenience. In case of software version upgrade, the previous version EPS Client will get uninstalled and new version of EPS Client will get installed.

109 Admin Settings

The Redirection feature is not applicable for the clients with Mac operating systems.

However, Redirection is applicable for the client installed on Linux operating system only if the redirected server has the same EPS Server version.

To configure Redirection, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab. 2. On the Admin Settings page, go to Server > Redirection. 3. In the Server Name/IP text box, type the sever name or IP address. 4. In the Port text box, type the Port number. 5. Select the type of redirection from the following options:  Select all clients to be redirected.  Redirect select clients. If you select this option, the Select clients link is displayed. Click Select clients. In the Select clients dialog box that appears, select the clients that you want to redirect and click Done. Note: Use the search box on the upper right side to search for endpoints by name or IP address.  To apply your settings, click Apply.

Manage Users This feature helps you create a list of users of administrator level and report viewer level. Different types of users include:

Super Administrator A Super Administrator user has access to all the features of Quick Heal Endpoint Security. A Super Administrator can create and modify Administrator users. Only such a user has the privilege to uninstall Quick Heal Endpoint Security. There can only be one user with Super Administrator privileges. The default user name for Super Administrator is ‘administrator’.

Administrator User with Administrator privileges has all the privileges of a Super Administrator, with two exceptions: 1. Such a user cannot create another user with Administrator privileges. 2. Such a user cannot uninstall Quick Heal Endpoint Security.

Report Viewer A user with the Report Viewer privileges can only view reports and status of features. This user has no other privileges. However, this type of users can change their own password.

110 Admin Settings

Creating New Users To create a new user, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > Manage Users. 3. On the Manage Users page, click Add User. An Add/Edit User dialog appears. 4. In the User Name text box, type the user name. 5. In the New Password text box, type the new password. 6. In the Confirm New Password text box, re-type the new password. 7. From the Type list, select the user type. The user type includes: Administrator and Report Viewer. 8. To save you settings, click Save.

Modifying Existing Users To modify the settings of an existing user, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab. 2. On the Admin Settings page, go to Server > Manage Users. A list of all users appears. 3. Click the Edit button next to the user that you want to edit. 4. You can modify the setting according to the right privileges assigned to you. The Add/Edit User dialog appears. 5. In the New Password text box, type the new password. 6. In the Confirm New Password text box, re-type the new password. 7. From the Type list, select the new type if you want. 8. To save you settings, click Save.

Deleting Users To delete an existing user, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > Manage Users. A list of all users appears. 3. Click Delete next to the user that you want to delete.

111 Admin Settings

You can delete a user if you have the right privileges to do so. A confirmation message appears. 4. To delete the users, click Yes.

General This feature helps you configure the setting about when the running session should time out. The running session will time out if the current session is dormant for the time specified here. To configure General, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, go to Server > General. 3. In the Session time out period list, set time. You can select either 20 minutes, 30 minutes, or 60 minutes. 4. To apply your settings, click Apply.

Clients

This section includes the following.

Client Installation This feature helps you specify the path to the location where you want to get the client installed. By default a path is configured that you can change if required. In order to change the Quick Heal client installation path, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab. 2. On the Admin Settings page, click Clients. The Client Installation page appears. 3. In the Please specify client installation path text box, type the installation path. 4. Under Scan and Report, select any of the following options as per requirement:  Scan for vulnerabilities  Scan and report all installed applications 5. To apply the setting, click Apply.

 The features are not available in the clients with Mac and Linux operating systems.  After you activate Quick Heal Endpoint Security, vulnerability scan runs on the EPS server automatically. After installation, it may run on the client if the option Scan for vulnerabilities is selected under Admin Settings > Clients > Client Installation > Scan and Report. However, this option is selected by default.

112 Admin Settings

Inactive Client Settings When you uninstall the Quick Heal client from an endpoint, the program automatically notifies the server. When the server receives this information, it removes the client icon in the computer tree subsequently. However, if the client is removed using other methods, such as you reformat the computer hard drive or delete the client files manually, Quick Heal Endpoint Security will display the client as inactive. If a user unloads or disables the client for an extended period of time, the server also displays the client as inactive. To protect the display of active clients, you can configure Quick Heal Endpoint Security to automatically remove inactive clients from the computer protection list.

The Inactive Client Settings feature is available only in the clients with Microsoft Windows, Mac, and Linux operating systems.

To automatically remove inactive clients, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console and then click the Admin Settings tab 2. On the Admin Settings page, click Clients. The Client Installation page appears. 3. Under Inactive Client Settings, select Enable automatic removal of inactive clients. 4. In the Remove a client if inactive for list, select how many days after Quick Heal Endpoint Security considers a client is inactive. 5. To apply the setting, click Apply.

Asset Management You can enable the Asset Management reporting by the following procedure. 1. Log on to the Quick Heal Endpoint Security web console. 2. Click Admin Settings > Clients. 3. Select Enable Asset Management. 4. Click Apply .

113

Chapter 13. Update Manager

Update Manager is a tool integrated with Quick Heal Endpoint Security. It is used to download and manage the updates for Quick Heal Endpoint Security. It provides you the flexibility to download the updates on a single machine. All the Quick Heal Endpoint Security clients fetch the updates from this centralized location. It also provides the facility of automatically updating Quick Heal Endpoint Security for enhancements or bug fixes. Update Manager integrated with Quick Heal Endpoint Security includes all the features that are available in the Update Manager application. Any change in settings made here will reflect in the Update Manager application.

Viewing Update Manager Status

Use this feature to view information of all types of updates downloaded by Update Manager. The console displays the Version, Service Pack, and the date of the associated Virus Database. Additionally, the console also provides the following details:

Fields Description

Endpoint Name Displays the name of the endpoint where Update Manager is installed. IP Address Displays the IP address of the endpoint where Update Manager is installed. Status Provides the information about Update Manager, whether it is online or offline. The two buttons available under Update Manager Status are:

Buttons Description

Update Now Click this button to send a Notification from Quick Heal Endpoint Security to Update Manager to start downloading the updates. This process occurs in the background and will not be visible to the user. Click Back to go to the Status page. Rollback Click this button to take the Update Manager back to the previous update state. Note: This feature will work only if Always take backup before downloading new update option is selected in the configuration section of the Update Manager application. The steps for performing Rollback are as follows:  Click the Rollback button. A pop-up window opens. The Quick Heal product updates that will be affected by the rollback are displayed.  To begin the Rollback process, click Rollback.

114 Update Manager

Update Manager Settings

The following are the features available under Update Manager Settings:

Features Description

Enable Automatic Updates Select this box to enable automatic update of Quick Heal Endpoint Security. However, this feature is enabled by default. It is recommended that you do not disable this feature. Always take backup before Select this box to enable to take the backup of the existing downloading new update updates before new updates are downloaded. These backups are used in case a rollback to previous update is required. However, this feature is enabled by default. Delete report after Select this box to enable deletion of reports automatically after the time you specify. This feature is enabled by default and the default time is 10 days. To save you settings, click the Apply button.

Alternate Update Managers

In case of large network, you can deploy multiple Update Managers on different servers. This helps in load balancing and you can configure Clients in Client Settings to take the updates from these locations. To configure Alternate Update Mangers, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console. 2. On the Home page, click the Update Manager link available along with the product name and details. 3. On the Update Manager page, click the Alternate Update Manager tab. 4. In Enter Update Manager URL, type a URL and then click Add. You can edit or delete the URL whenever required.

115

Chapter 14. License Manager

This feature allows you to manage the Quick Heal Endpoint Security licenses. You can check the status of your Quick Heal Endpoint Security license and update license information. You can place an order to renew your license, add new licenses to your existing setup, buy additional features packs.

Status

This feature helps you check the current status of your license information. To check the status of your license, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console. 2. On the Home page, click the View License link available along with the product name and details. 3. On the License Manager page, click the Status tab. The license information includes the following details:

Title Description

Company Name Displays the name of the company to which Quick Heal Endpoint Security is registered. Product Name Displays the product name. Example: Endpoint Security – Total. Product Key Displays the Product Key of Quick Heal Endpoint Security. Product Type Displays the product type. Example: Regular. Installation Number Displays the installation number. License Valid till Displays expiry date of the Quick Heal Endpoint Security license. Maximum number of Displays total number of systems which can be protected systems under console with Quick Heal Endpoint Security.

Update License Information This feature is useful to synchronize your existing license information with Quick Heal Activation Server. You can update your license information whenever required. This is helpful in updating the following license information:  License expiry date: If you renewed the license but the expiry date is not updated or displays the old expiry date.

116 License Manager

 Number of SMS left: If you have purchased SMS bundle for notification but the limit has not been refreshed. Note: If you want to renew your existing license and you do not know how to renew it or are facing any problem during renewal, you can call the Quick Heal Support team and provide your Product Key.

View license history You can view the details of your license purchase history if you click the License History button. The following information is displayed in the License History pop-up window.  Type of transaction: The type of purchase, such as license activation, pack addition, license renewal, license addition, and re-activation of license.  Time and date of transaction: The time and date when the transaction was carried out.  Details: Details relevant to the transaction, such as type, number of licenses added, type of feature pack added or removed, validity of the license purchased.

License Order Form

This feature helps you create a license order form for an additional license, renewal of your exiting license, or new feature packs. This is an offline activity and helps you only in creating the license order. After generating an order form, take out its print, contact a vendor or dealer, and submit it. You can also send an email with the license order form to the Quick Heal sales team, we will contact you for further process. To create a license order form, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console. 2. On the Home page, click the View License tab. 3. On the License Manager page, click the License Order Form tab. 4. To create a License Order form, select one of the following:  Renew my license: Helps you renew your current license.  Add license for new endpoints: Helps you buy additional licenses.  Buy additional feature: Helps you buy additional features packs. 5. Click Place an Order. An order is created and an automated Email is sent to the Quick heal branch sales representative to process your order.

117 License Manager

Renew my license If you select the Renew my license option, you are redirected to the online portal of Quick Heal where you can place an order for your license renewal. As you visit the portal, your license details are displayed. On the Quick Heal online portal, do the following: 1. Under Product Details, verify your product license details 2. Under Please provide your renewal order details, enter Duration for which you want to renew and Renew the license for the systems. 3. Click Submit. A summary of the license renewal order is displayed. Verify it carefully as your order will be processed according to your preference. If you want to modify your order, you can go to the previous page by clicking the Back button and make the required changes. 4. Type the email IDs to whom you want to send the order. 5. Click Place a Request. Your license renewal request number is generated. Save this number as you will need to quote this number in all communications related to license renewal. 6. Click Finish.

Add license for new endpoints If you select the Add license for new endpoints option, you are redirected to the online portal of Quick Heal where you can place an order for additional licenses for endpoints. As you visit the portal, your license details are displayed. On the Quick Heal online portal, do the following: 1. Under Product Details, verify your product license details. 2. Under Please provide your Additional license details, enter the number of systems for which you want additional licenses. 3. Click Submit. A summary of the additional license order is displayed. Verify it carefully as your order will be processed according to your preference. If you want to modify your order, you can go to the previous page by clicking the Back button and make the required changes. 4. Enter email IDs to whom you want to send the order. 5. Click Place a Request. Your license addition request number is generated. Save this number as you will need to quote this number in all communications related to additional license order. 6. Click Finish.

118 License Manager

Buy additional feature If you select the Buy additional feature option, you are redirected to the online portal of Quick Heal where you can place an order for a license for additional features. As you visit the portal, your license details are displayed. On the Quick Heal online portal, do the following: 1. Under Product Details, verify your product license details. 2. Under Please provide details of feature packs which you wish to subscribe, select the feature packs that you want to subscribe. 3. Click Submit. A summary of the order for feature packs is displayed. Verify it carefully as your order will be processed according to your preference. If you want to modify your order, you can go to the previous page by clicking the Back button and make the required changes. 4. Enter email IDs to whom you want to send the order. 5. Click Place a Request. Your license request number for new feature packs is generated. Save this number as you will need to quote this number in all communications related to new feature packs. 6. Click Finish.

119

Chapter 15. Technical Support

Quick Heal provides extensive technical support for the registered users. It is recommended that you have all the necessary details with you during the call to receive efficient support from the Quick Heal support executives.

Support

The Support option includes FAQ where you can find answers to the most frequently asked questions, options to submit your queries, send emails about your queries, or call us directly.

Accessing support options To access the Support options, follow these steps: 1. Log on to the Quick Heal Endpoint Security web console. 2. On the top right on the Quick Heal Endpoint Security Dashboard, click the Support button. Select any of the following support options that you need:  Web Support  Email Support  Live Chat Support  Phone Support

Web Support To view the frequently asked questions, click the Visit FAQ button or click the Visit Forums button to share tips, solutions, and to submit your queries.

Email Support To submit your queries, click the Submit Ticket button. When you click the Submit Ticket button, you are redirected to the support Web page of Quick Heal where you can submit your queries.

Live Chat Support This feature allows you to chat with the Quick Heal technical executives to get your issues resolved.

Phone Support This feature helps you to call the Quick Heal technical experts for instant support. Contact number for the phone support: +91–92722–12121.

120 Technical Support

Support Tips

When is the best time to call? Quick Heal Technologies (P) Ltd. provides technical support between 9:30 AM and 6:30 PM, Monday to Saturday IST (India Standard Time).

Which number to call? Quick Heal users can call +91–92722–12121. Regional support for South India is available at +91–90431–21212 (Malayalam, Tamil, Telugu, and Kannada)

For support in other countries: To submit online queries and to avail of the online chat facility, visit http://www.quickheal.com/contact_support (24/7) To check for the phone numbers in specific countries, visit http://www.quickheal.com/int_techsupp To check for the dealers in your country, visit http://www.quickheal.com/locate-dealer.

The details that are necessary during the call are:  Product Key that is included in the boxed version of the products. If the product is purchased online, then the Product Key can be obtained from the email confirming the order.  Information about the computer: brand, processor type, RAM capacity, the size of the hard drive and free space on it, as well as information about other peripherals.  The operating system: name, version number, language.  Version of the installed anti-virus and the virus database.  Software installed on the computer.  Is the computer connected to a network? If yes, contact the system administrators first. If the administrators cannot solve the problem they should contact the Quick Heal technical support.  Details: When did the problem first appear? What were you doing when the problem appeared?

What should I say to the technical support personnel? You need to be as specific as possible and provide maximum details as the support executive will provide solution based on your input.

121 Technical Support

Global Support Center Telephone Support: +91–92722–33000. Email: [email protected]

Online Support Submit your query at http://support.quickheal.com Online chat is available at http://www.quickheal.com/olsup.asp Contact Quick Heal Technologies Head Office Quick Heal Technologies (P) Ltd. 603, Mayfair Towers II, Wakdewadi, Shivajinagar, Pune 411 005, Email: [email protected] For more details, please visit: www.quickheal.com.

122